Nexus 7k
Nexus 7k
x, Release
Notes
This document describes the features, caveats, and limitations for Cisco NX-OS software for use on the
Cisco Nexus 7000 Series Switches. Use this document in combination with documents listed in Related
Documentation, page 84.
Note Release notes are sometimes updated with new information about restrictions and caveats. See the
following website for the most recent version of the Cisco Nexus 7000 Series NX-OS Release Notes:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-release-notes-list.html
Date Description
June 11, 2018 Updated the Supported Upgrade and Downgrade Paths, page 36 section to
include Cisco NX-OS Release 7.3(2)D1(3).
April 12, 2018 Created release notes for Cisco NX-OS Release 8.2(2).
March 7, 2018 Created release notes for Cisco NX-OS Release 8.1(2a).
January 30, 2018 Created release notes for Cisco NX-OS Release 8.1(2).
September 28, 2017 Created release notes for Cisco NX-OS Release 8.2(1).
June 30, 2017 Updated the Non-ISSU Upgrade/Cold Boot Upgrade, page 43 section to include
Cisco NX-OS Release 7.3(2)D1(1).
May 3 2017 Created release notes for Cisco NX-OS Release 8.1(1).
February 21, 2017 Updated the Upgrade and Downgrade Paths and Caveats, page 36 section to
include Cisco NX-OS Release 6.2(18).
December 22, 2016 Created release notes for Cisco NX-OS Release 8.0(1).
Contents
This document includes the following sections:
• Introduction, page 2
• System Requirements, page 2
• Guidelines and Limitations, page 28
• Upgrade and Downgrade Paths and Caveats, page 36
• Erasable Programmable Logic Device Images, page 51
• New Hardware, page 54
• New and Enhanced Software Features, page 55
• MIBs, page 68
• Licensing, page 68
• Caveats, page 68
• Related Documentation, page 84
• Obtaining Documentation and Submitting a Service Request, page 84
Introduction
The Cisco NX-OS software for the Cisco Nexus 7000 Series fulfills the routing, switching, and storage
networking requirements of data centers and provides an Extensible Markup Language (XML) interface
and a command-line interface (CLI) similar to Cisco IOS software.
System Requirements
This section includes the following topic:
• Supported Device Hardware, page 2
Note Cisco Nexus 7000 Supervisor 1 modules, M1 series modules (XL and non-XL modes), FAB-1 modules,
F2 series modules are not supported in Cisco NX-OS Release 8.x.
Table 2 shows the Cisco Nexus 7000 Series Switch and Cisco Nexus 7700 Switch hardware support
details.
Table 3 shows the Fabric Extender (FEX) modules supported by the Cisco Nexus 7000 and Cisco Nexus
7700 I/O modules.
Table 4 shows the transceiver devices supported in each release of Cisco Nexus 7000 Series.
For a list of minimum recommended Cisco NX-OS software releases for use with Cisco Nexus 7000
Series switches, see the document titled Minimum Recommended Cisco NX-OS Releases for Cisco Nexus
7000 Series Switches.
Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support
Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support
Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
FEX Modules Supported by Cisco Nexus 7000 Series Modules
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
48-port 1-/10-Gigabit Ethernet SFP+ I/O N2K-C2232PP 8.1(1)
M3 Series module (N7K-M348XP-25L)
N2K-C2224TP
24-port 40-Gigabit Ethernet QSFP+ I/O N2K-C2248TP-E
M3 Series module (N7K-M324FQ-25L)
N2K-C2248PQ
N2K-C2348UPQ
N2K-C2348TQ
N2K-C2332TQ
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
12-port 40-Gigabit Ethernet QSFP I/O N2K-C2224TP-1GE 6.2(12)
F3 Series module (N7k-F312FQ-25)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP1
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
6-port 40-Gigabit Ethernet I/O M2 N2k-2348UPQ 7.2(0)D1(1)
Series module XL (N7K-M206FQ-23L)
N2k-2348TQ
Breakout (4*10G) mode 40-Gigabit N2k-2224TP 7.2(0)D1(1)
Ethernet I/O M2 Series module XL N2k-2232PP
(N7K-M206FQ-23L)
N2k-2232TM
N2k-2232TM-E
N2k-2248PQ
N2k-2248TP
N2k-2248TP-E
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
24-port 10-Gigabit Ethernet I/O M2 N2K-C2224TP-1GE 6.1(1)
Series module XL (N7K-M224XP-23L)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E 6.2(2)
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
48-port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2224TP-1GE 6.2(12)
F3 Series module (N7K-F348XP-25)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-2232TM-E
N2K-2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
Enhanced 48-port 1/10 Gigabit Ethernet N2K-C2224TP-1GE 6.1(2)
SFP+ I/O module (F2E Series)
N2K-C2248TP-1GE
(N7K-F248XP-25E)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-2232TM-E 6.2(2)
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
FEX Modules Supported by Cisco Nexus 7700 Series Modules
48-port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2224TP-1GE 6.2(2)
module (F2E Series)
N2K-C2248TP-1GE
(N77-F248XP-23E)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2232TM-E
N2K-C2248PQ
N2K-C2248TP-E
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
24-port Cisco Nexus 7700 F3 Series N2K-C2224TP-1GE 6.2(8)
40-Gigabit Ethernet QSFP I/O module
N2K-C2248TP-1GE
(N77-F324FQ-25)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP2
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
48-port Cisco Nexus 7700 F3 Series N2K-C2224TP-1GE 6.2(6)
1/10-Gigabit Ethernet SFP+ I/O module N2K-C2248TP-1GE
(N77-F348XP-23)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)
Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
48-Port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2232PP 8.1(1)
M3 Series module (N77-M348XP-23L)
N2K-C2224TP
N2K-C2248TP-E
24-Port 40 Gigabit Ethernet QSFP+ I/O N2K-C2248PQ
M3 Series module (N77-M324FQ-25L)
N2K-C2348UPQ
N2K-C2348TQ
N2K-C2332TQ
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
1. FEX server-facing interfaces should be configured in autonegotiate mode. Do not force a specific data rate.
Note The Cisco Nexus 7000 Enhanced F2 Series 48-port 1/10 GBASE-T RJ-45 Module (N7K-F248XT-25E)
does not support Cisco Nexus 2000 FEXs.
Note FEX modules does not support M3 series modules in Cisco NX-OS Release 7.3(0)DX(1), Cisco NX-OS
Release 7.3(1)D1, and in Cisco NX-OS Release 8.0(1).
Minimum
Software
I/O Module Product ID Transceiver Type Version
N77-F248XP-23E FET-10G Cisco Fabric Extender Transceiver 6.2(2)
(FET)
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(2)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(2)
SFP-10G-LR-S
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-ER 10GBASE-ER SFP+ 6.2(2)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(2)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(2)
SFP-10G-ZR-S
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(2)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(2)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(2)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(2)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(2)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(2)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(2)
GLC-SX-MM 1000BASE-SX SFP 6.2(2)
GLC-SX-MMD 1000BASE-SX SFP 6.2(2)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T SFP 6.2(2)
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-BX-D 1000BASE-BX10-D 6.2(2)
GLC-BX-U 1000BASE-BX10-U 6.2(2)
GLC-EX-SMD 1000BASE-EX SFP 6.2(2)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.2(2)
DWDM-SFP10G-xx.xx3 10GBASE-DWDM SFP+ 6.2(2)
3
DWDM-SFP-xxxx 1000BASE-DWDM 6.2(2)
4
N77-F312CK-26 CPAK-100G-SR4 Multi-mode fiber (MMF) 7.3(2)D1(1)
Minimum
Software
I/O Module Product ID Transceiver Type Version
CVR-QSFP-SFP10G Cisco 40G QSFP 6.2(14)
(This is supported only on
F3 40G I/O modules with
SFP-10G-SR or
SFP-10G-SR-S optics. If
the F3 I/O module is
reloaded, the ports
containing the
CVR-QSFP-SFP10G
adapter may remain down
even after the F3 I/O
module comes back up. If
so, the CVR-QSFP-SFP10G
adapter must be reseated.)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.2(6)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(6)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.2(6)
QSFP-40G-LR4-S
FET-40G Cisco 40G Fabric Extender 6.2(8)
Transceiver (FET)
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(8)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-4X10G-LR-S Single-mode fiber (SMF) 7.3(1)D1(1)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,5
m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 6.2(10)
QSFP+
Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
N77-F348XP-23 CWDM-SFP-xxxx2 1000BASE-CWDM 6.2(8)
2
DWDM-SFP-xxxx 1000BASE-DWDM 6.2(8)
GLC-TE 1000BASE-T SFP 6.2(10)
FET-10G Cisco Fabric Extender Transceiver 6.2(6)
(FET)
SFP-10G-AOCxM 110GBASE-AOC (Active Optical 6.2(10)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(6)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(6)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.2(6)
SFP-10G-ER-S
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(6)
SFP-10G-ZR-S
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.2(6)
1
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(8)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(8)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(8)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(8)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(8)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(8)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(8)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(8)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(8)
Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(8)
GLC-SX-MM 1000BASE-SX SFP 6.2(8)
GLC-SX-MMD 1000BASE-SX SFP 6.2(8)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(8)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(8)
GLC-T 1000BASE-T SFP 6.2(8)
GLC-BX-D 1000BASE-BX10-D 6.2(8)
GLC-BX-U 1000BASE-BX10-U 6.2(8)
GLC-EX-SMD 1000BASE-EX SFP 6.2(8)
FET-10G Cisco Fabric Extender Transceiver 6.2(8)
(FET)
N7K-F306CK-25 CPAK-100G-SR44 Multi-mode fiber (MMF) 7.3(2)D1(1)
CPAK-100G-ER4L Cisco 100GBASE-ER4L CPAK 7.2(1)D1(1)
#
CPAK-100G-LR4 Cisco 100GBASE-LR4 CPAK 6.2(10)
#
CPAK-100G-SR10 Cisco 100GBASE-SR10 CPAK 6.2(10)
N7K-F312FQ-25 CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
CVR-QSFP-SFP10G Cisco 40G QSFP 6.2(14)
(This is supported only on
F3 40G I/O modules with
SFP-10G-SR or
SFP-10G-SR-S optics. If
the F3 I/O module is
reloaded, the ports
containing the
CVR-QSFP-SFP10G
adapter may remain down
even after the F3 I/O
module comes back up. If
so, the CVR-QSFP-SFP10G
adapter must be reseated.)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.2(6)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(6)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.2(6)
QSFP-40G-LR4-S
FET-40G Cisco 40G Fabric Extender 6.2(6)
Transceiver (FET)
Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(8)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-4X10G-LR-S Single-mode fiber (SMF) 7.3(1)D1(1)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 6.2(10)
QSFP+
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
2
N7K-F348XP-25 CWDM-SFP-xxxx 1000BASE-CWDM 6.2(12)
DWDM-SFP-xxxx2 1000BASE-DWDM 6.2(12)
GLC-TE 1000BASE-T SFP 6.2(12)
FET-10G Cisco Fabric Extender Transceiver 6.2(12)
(FET)
SFP-10G-AOCxM 110GBASE-AOC (Active Optical 6.2(12)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(12)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(12)
SFP-10G-LR-S
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-ER 10GBASE-ER SFP+ 6.2(12)
SFP-10G-ER-S
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(12)
SFP-10G-ZR-S
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.2(12)
1
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(12)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(12)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(12)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(12)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(12)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(12)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(12)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(12)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(12)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(12)
GLC-SX-MM 1000BASE-SX SFP 6.2(12)
GLC-SX-MMD 1000BASE-SX SFP 6.2(12)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(12)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(12)
GLC-T 1000BASE-T SFP 6.2(12)
GLC-BX-D 1000BASE-BX10-D 6.2(12)
GLC-BX-U 1000BASE-BX10-U 6.2(12)
GLC-EX-SMD 1000BASE-EX SFP 6.2(12)
FET-10G Cisco Fabric Extender Transceiver 6.2(12)
(FET)
N7K-F248XP-25 FET-10G Cisco Fabric Extender Transceiver 6.0(1)
(FET)
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-SR 10GBASE-SR SFP+ 6.0(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.0(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.0(1)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.0(1)
SFP-10G-ZR 2 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.0(1)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.0(1)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.0(1)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.0(1)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.0(1)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.0(1)
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-LH-SM 1000BASE-LX/LH SFP 6.0(1)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.0(1)
GLC-SX-MM 1000BASE-SX SFP 6.0(1)
GLC-SX-MMD 1000BASE-SX SFP 6.0(1)
GLC-ZX-SM 1000BASE-ZX SFP 6.0(1)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T SFP 6.0(1)
GLC-BX-D 1000BASE-BX10-D 6.0(1)
GLC-BX-U 1000BASE-BX10-U 6.0(1)
GLC-EX-SMD 1000BASE-EX SFP 6.1(1)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.0(1)
3
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.1(1)
DWDM-SFP-xxxx 3 1000BASE-DWDM 6.0(1)
Minimum
Software
I/O Module Product ID Transceiver Type Version
N7K-F248XP-25E FET-10G Cisco Fabric Extender Transceiver 6.1(2)
(FET)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.1(2)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.1(2)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.1(2)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.1(2)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.1(2)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.1(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.1(2)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.1(2)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.1(2)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.1(2)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.1(2)
GLC-LH-SM 1000BASE-LX/LH SFP 6.1(2)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.1(2)
GLC-SX-MM 1000BASE-SX SFP 6.1(2)
GLC-SX-MMD 1000BASE-SX SFP 6.1(2)
GLC-ZX-SM 1000BASE-ZX SFP 6.1(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.1(2)
GLC-T 1000BASE-T SFP 6.1(2)
Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-BX-D 1000BASE-BX10-D 6.1(2)
GLC-BX-U 1000BASE-BX10-U 6.1(2)
GLC-EX-SMD 1000BASE-EX SFP 6.1(2)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.1(2)
3
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.1(2)
3
DWDM-SFP-xxxx 1000BASE-DWDM 6.1(2)
1
N7K-M108X2-12L SFP-10G-SR 10GBASE-SR SFP+ 5.2(3a)
SFP-10G-SR-S
SFP-10G-LR1 10GBASE-LR SFP+ 5.2(3a)
SFP-10G-LR-S
SFP-10G-LRM1 10GBASE-LRM SFP+ 5.2(1)
1
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 5.2(1)
Cable Passive (1 m, 3 m, 5 m)
CVR-X2-SFP10G OneX Converter Module - X2 to 5.2(1)
SFP+ Adapter
X2-10GB-CX4 10GBASE-CX4 X2 5.1(1)
X2-10GB-ZR 10GBASE-ZR X2 5.1(1)
X2-10GB-LX4 10GBASE-LX4 X2 5.1(1)
X2-10GB-SR 10GBASE-SR X2 5.0(2a)
X2-10GB-LR 10GBASE-LRX2 5.0(2a)
X2-10GB-LRM 10GBASE-LRM X2 5.0(2a)
X2-10GB-ER 10GBASE-ERX2 5.0(2a)
3
DWDM-X2-xx.xx= 10GBASE-DWDM X2 5.0(2a)
N7K-M148GS-11L SFP-GE-S 1000BASE-SX 5.0(2a)
GLC-SX-MM 5.0(2a)
SFP-GE-L 1000BASE-LX 5.0(2a)
GLC-LH-SM 5.0(2a)
SFP-GE-Z 1000BASE-ZX 5.0(2a)
GLC-ZX-SM 5.0(2a)
GLC-EX-SMD 1000BASE-EX SFP 6.2(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T 5.0(2a)
SFP-GE-T 5.0(2a)
GLC-BX-D 1000BASE-BX10-D 5.2(1)
Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-BX-U 1000BASE-BX10-U 5.2(1)
GLC-SX-MMD 1000BASE-SX 5.2(1)
GLC-LH-SMD 1000BASE-LX 5.2(1)
GLC-TE 1000BASE-T SFP 6.2(10)
3
DWDM-SFP-xxxx 1000BASE-DWDM 5.0(2a)
2
CWDM-SFP-xxxx 1000BASE-CWDM 5.0(2a)
N7K-M132XP-12L FET-10G Cisco Fabric Extender Transceiver 5.1(1)
(FET)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 5.1(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 5.1(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 5.1(1)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 5.1(1)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 5.1(1)
Cable Active (7 m, 10 m)
SFP-H10GB-CUxM1 SFP-H10GB-CUxM Twinax 5.1(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
DWDM-SFP10G-xx.xx 3 10GBASE-DWDM SFP+ 6.1(1)
N7K-M224XP-23L SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
FET-10G Cisco Fabric Extender Transceiver 6.1(1)
(FET)
SFP-10G-SR 10GBASE-SR SFP+ 6.1(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.1(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.1(1)
SFP-10G-ER-S
SFP-10G-ZR 3 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.1(1)
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.1(1)
Cable Active (7 m, 10 m)
SFP-H10GB-CUxM 1 SFP-H10GB-CUxM Twinax 6.1(1)
Cable Passive (1m, 3m, 5m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
DWDM-SFP10G-xx.xx 3 10GBASE-DWDM SFP+ 6.1(1)
N77-M312CQ-26L CPAK-100G-SR4 Multi-mode fiber (MMF) 8.1(1)
QSFP-100G-CSR4-S 100G extended short reach 300m 8.2(1)
OM3 400m OM4
QSFP-100G-ER4L-S 100G-ER4 lite SMF (40km) 8.2(1)
QSFP-100G-SM-SR 100G Short Reach over dual SMF 8.2(1)
(2km)
QSFP-100G-SR4-S Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-CSR4
QSFP-40G-SR4
QSFP-40G-SR4-S
QSFP-40G-SR-BD
Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-100G-CWDM4-S Single-mode fiber (SMF) 8.0(1)
QSFP-100G-PSM4-S
QSFP-100G-LR4-S
QSFP-40G-LR4-S
QSFP-40G-ER4
QSFP-40G-LR4
QSFP-H40G-ACU7M Direct attach copper, active 8.0(1)
QSFP-H40G-ACU10M
QSFP-100G-AOC1M Active optical cable assembly 8.0(1)
QSFP-100G-AOC2M
QSFP-100G-AOC3M
QSFP-100G-AOC5M
QSFP-100G-AOC7M
QSFP-100G-AOC10M
QSFP-100G-AOC15M
QSFP-100G-AOC20M
QSFP-100G-AOC25M
QSFP-100G-AOC30M
QSFP-H40G-AOC1M
QSFP-H40G-AOC2M
QSFP-H40G-AOC3M
QSFP-H40G-AOC5M
QSFP-H40G-AOC7M
QSFP-H40G-AOC10M
QSFP-H40G-AOC15M
WSP-Q40G-LR4L 40GBASE-LR4 QSFP40G (for 8.0(1)
Single-mode Fiber (SMF))
N77-M324FQ-25L CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
FET-40G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
QSFP-40G-CSR4 Multi-mode fiber (MMF) 7.3(0)DX(1)
QSFP-40G-SR4
QSFP-40G-SR4-S
QSFP-40G-SR-BD
Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-ER4 Single-mode fiber (SMF) 7.3(0)DX(1)
QSFP-40G-LR4
QSFP-40G-LR4-S
QSFP-4X10G-LR-S
WSP-Q40G-LR4L
QSFP-H40G-ACU7M Direct attach copper, active 7.3(0)DX(1)
QSFP-H40G-ACU10M
QSFP-4X10G-AC7M Direct attach breakout copper, 8.0(1)
QSFP-4X10G-AC10M active
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-SR Multi-mode fiber (MMF) 7.3(0)DX(1)
SFP-10G-SR-S 10G BASE-SR SFP+ transceiver 8.0(1)
module for Multi-mode fiber
(MMF)
DWDM-SFP10G-xx.xx3 Single-mode fiber (SMF) 7.3(0)DX(1)
SFP-10G-BXD-I
SFP-10G-BXU-I
SFP-10G-LRM
SFP-10G-ER 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-ER-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-10G-LR 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-LR-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-10G-ZR 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-ZR-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-H10GB-CU1M Twinax cable assembly, passive 7.3(0)DX(1)
SFP-H10GB-CU1-5M
SFP-H10GB-CU2M
SFP-H10GB-CU2-5M
SFP-H10GB-CU3M
SFP-H10GB-CU5M
SFP-H10GB-ACU7M Twinax cable assembly, active 7.3(0)DX(1)
SFP-H10GB-ACU10M
Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-AOC1M Active optical cable assembly 7.3(0)DX(1)
SFP-10G-AOC2M
SFP-10G-AOC3M
SFP-10G-AOC5M
SFP-10G-AOC7M
SFP-10G-AOC10M
N7K-M202CF-22L CFP-40G-SR4 40GBASE-SR4 CFP 6.1(2)
CFP-40G-LR4 40GBASE-LR4 CFP 6.1(2)
CFP-100G-SR10 100GBASE-SR10 CFP 6.1(3)
CFP-100G-LR4 100GBASE-LR4 CFP 6.1(1)
CFP-100G-ER4 100GBASE-ER4 CFP 6.2(10)
N7K-M206FQ-23L FET-40G Cisco 40G Fabric Extender 6.2(6)
Transceiver (FET)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.1(1)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(2)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.1(4)
QSFP-40G-LR4-S
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(2)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 62(10)
QSFP+
Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
N7K-M324FQ-25L CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
FET-40G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
QSFP-H40G-ACUxM Direct attach copper, active 8.0(1)
QSFP-H40G-AOCxM Active optical cable assembly 8.0(1)
QSFP-4X10G-AC7M Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-AC10M Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-ACUxM Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-AOC1M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC2M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC3M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC5M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC7M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC10M Active optical breakout cable 8.0(1)
assembly
QSFP-40G-CSR4 Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-ER4 Single-mode fiber (SMF) 8.0(1)
QSFP-4x10G-LR-S Single-mode fiber (SMF) 8.0(1)
QSFP-40G-LR4 Single-mode fiber (SMF) 8.0(1)
QSFP-40G-LR4-S Single-mode fiber (SMF) 8.0(1)
QSFP-40G-SR4 Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-SR4-S Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-SR-BD Multi-mode fiber (MMF) 8.0(1)
2
N7K-M348XP-25L CWDM-SFP-xxxx Single-mode fiber (SMF) 7.3(0)DX(1)
CWDM-SFP 10G-1xxx Single-mode fiber (SMF) 8.0(1)
DWDM-SFP-xxxx Single-mode fiber (SMF) 7.3(0)DX(1)
Minimum
Software
I/O Module Product ID Transceiver Type Version
DWDM-SFP 10G-xx.xx Single-mode fiber (SMF) 8.0(1)
FET-10G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
GLC-BX-U Single-mode fiber (SMF) 7.3(0)DX(1)
GLC-BX-D
GLC-EX-SMD
GLC-LH-SMD
GLC-ZX-SMD
GLC-LH-SMD Multi-mode fiber (MMF) 7.3(0)DX(1)
GLC-SX-MMD
GLC-TE Category 5 7.3(0)DX(1)
SFP-10G-AOCxM Active optical cable assembly 8.0(1)
SFP-10G-BXU-I Single-mode fiber (SMF) 8.0(1)
SFP-10G-BXD-I Single-mode fiber (SMF) 8.0(1)
SFP-10G-ER Single-mode fiber (SMF) 8.0(1)
SFP-10G-LR Single-mode fiber (SMF) 8.0(1)
SFP-10G-LRM Single-mode fiber (SMF) 8.0(1)
SFP-10G-SR Multi-mode fiber (MMF) 8.0(1)
SFP-10G-ZR Single-mode fiber (SMF) 8.0(1)
SFP-H10GB-ACU7M Twinax cable assembly, active 8.0(1)
SFP-H10GB-ACU10M Twinax cable assembly, active 8.0(1)
SFP-H10GB-CU1M Twinax cable passive 8.0(1)
SFP-H10GB-CU1-5M Twinax cable passive 8.0(1)
SFP-H10GB-CU2M Twinax cable passive 8.0(1)
SFP-H10GB-CU2-5M Twinax cable passive 8.0(1)
SFP-H10GB-CU3M Twinax cable passive 8.0(1)
SFP-H10GB-CU5M Twinax cable passive 8.0(1)
1
Minimum version supported is -02.
2
CWDM-SFP-xxxx is supported only with 1-Gigabit Ethernet I/O modules.
3
DWDM-SFP10G-C is not supported.
4
For Cisco NX-OS 8.x releases, CPAK-100G-SR4 is supported from Cisco NX-OS Release 8.1(1).
#
If you remove and reinsert a CPAK, reinsertion must be delayed by at least 30 seconds. This enables the device to discharge
completely and power up properly upon reinsertion.
Note For a complete list of supported optical transceivers, see the Cisco Transceiver Module Compatibility
Information page.
• When you use the storm-control unicast level percentage command in a module, both the unknown
and known unicast traffic gets discarded after reaching the threshold value.
VXLAN BGP EVPN and OTV inter operation feature has the following limitations on M3 modules for
in Cisco NX-OS Release 8.2(1):
• This feature is supported only on the M3-only VDC.
• A secondary IP has to be configured on each BDI. Anycast IP should also be configured, it acts as
a primary and continue to be used on the VXLAN side.
• To enable seamless mobility across legacy and VXLAN PODs, HSRP MAC and Anycast gateway
MAC should be explicitly cross configured as gateway MAC.
• The tunnel-stitching command flaps the overlay interface.
• Static ARP is required for Layer 3 connectivity between vPC peers.
• Orphan port should not be connected to the vPC secondary.
• OTV Proxy ARP is not supported for OTV with BDI.
• VXLAN ARP Suppression and OTV Proxy ARP should be consistently configured.
• There is no ISSU support for VXLAN with OTV and BDI feature.
• Router-on-a-stick approach is used for overlay multicast routing.
• OTV loopback is not supported.
• Migration option 1 or option 2 should be used in Cisco NX-OS Release 8.2(1).
• Layer 3 multicast routing is not supported on border leaf with VXLAN+OTV extension.
• Two overlays on a same join interface are not supported.
• VXLAN BGP EVPN and OTV inter operation feature does not have any convergence improvements
in Cisco NX-OS Release 8.2(1).
• VXLAN BGP EVPN and OTV inter operation feature supports only 3 OTV sites in Cisco NX-OS
Release 8.2(1).
M3 FEX Support
The number of VLANs per Fabric Extender server interface is 300 for M3 modules.
M3 FEX does not support the following features in Cisco NX-OS Release 8.1(1):
• vPC+ / FabricPath
• PVLAN over FEX
• VSI / EVPN with FEX
• FEX AA (active-active mode)
• Dynamic Routing over vPC feature (for IPv4 Unicast traffic only) is supported on F2E, F3, and M3
series modules in Cisco NX-OS. Dynamic Routing is not supported over vPC+.
The following features are not supported on a VDC that has an M3 module:
• MPLS L2VPN
• MPLS L2VPN QoS
• LISP
• Physical port vPC
• Storage VDC
• QoS Template: 7e/6e/4e network QOS: The QoS templates are globally applied from the default
VDC and hence this would not be allowed at the system level, which means if the system has an M3
module, the QoS templates would not be supported.
• PTP Pong
The following features are not supported on a VDC that has an M3 module:
• FabricPath
• vPC+
• MPLS L2VPN
• MPLS L2VPN QoS
• LISP
• Physical port vPC
• FEX
• Storage VDC
• QoS Template: 7e/6e/4e network QOS: The QoS templates are globally applied from the default
VDC and hence this would not be allowed at the system level, which means if the system has an M3
module, the QoS templates would not be supported.
• PTP Pong
• Dynamic Routing over vPC feature (for IPv4 Unicast traffic only) is supported only on F2E and F3
series modules in Cisco NX-OS.
• When you use the storm-control unicast level percentage command in a module, both the unknown
and known unicast traffic gets discarded after reaching the threshold value.
Guidelines and Limitations Common for Cisco NX-OS Release 8.0(1) and Cisco
NX-OS Release 8.1(1)
The following guidelines and limitations are applicable to both the Cisco NX-OS Release 8.0(1) and
Cisco NX-OS Release 8.1(1).
Beginning with Cisco NX-OS Release 8.0(1), the following M1-Series I/O modules are not supported:
• Cisco Nexus 7000 M1-Series 48-port Gigabit Ethernet Module with XL Option (SFP optics)
(N7K-M148GS-11L)
• Cisco Nexus 7000 M1-Series 48-port 10/100/1000 Ethernet Module with XL Option (RJ45)
(N7K-M148GT-11L)
• Cisco Nexus 7000 M1-Series 32 Port 10GbE with XL Option, 80G Fabric (requires SFP+)
(N7K-M132XP-12L)
• Cisco Nexus 7000 M1-Series 8-Port 10 Gigabit Ethernet Module with XL Option (requires X2)
(N7K-M108X2-12L)
Beginning with Cisco NX-OS Release 8.0(1), the following F2-Series I/O modules are not supported:
• Nexus 7000 F2-Series 48 Port 1G/10G Ethernet Module, SFP/SFP+ (and spare) (N7K-F248XP-25,
N7K-F248XP-25=)
The following features are not supported for VXLAN BGP EVPN in VDCs having M3 modules:
• EVPN VXLAN leaf functionality (except Border Leaf functionality) is not supported.
• LISP hand off is not supported.
• Hosts connected behind FEX is not supported.
Smart Licensing show commands are missing on the non-default VDC context. The work around is to
use the default VDC to verify license related show outputs.
OTV Traffic Fails on VXLAN EVPN Border Leaf Due To ARP Resolution Failure
OTV traffic fails on VXLAN EVPN border leaf due to ARP resolution failure. This issue occurs on the
following conditions:
• Dual switch VPC Border Leaf
• M3 only VDC setup
• vPC legs connected to OTV VDC
• Reloading the switch
• Using shutdown and no shutdown commands on the port-channel logical interface
The workaround to his issue is to do a ‘shutdown’ and ‘no shutdown’ of vPC port-channel member
interfaces from both the vPC switches and then re-send the ARP for the flows.
Changing the native VLAN on an access port or trunk port will flap the interface. This behavior is
expected.
Passive Copper Optic Cables are not Supported on the Non EDC Ports
Passive copper optic cables are not supported on the non-EDC ports.
The delay in link up event in SFP+ implementation is due to a factor called Electronic Dispersion
Compensation (EDC). EDC ports mitigate power penalties associated with optical link budgets.
Receivers without EDC (for example - SFP, where there is no delay in bringing the port up) can recover
an optical signal only if the dispersion is less than approximately one-half Unit Interval (UI) over the
length of fiber.
QSFP passive copper (QSFP-H40G-CU1M, QSFP-H40G-CU3M, QSFP-H40G-CU5M), and copper
breakout cables (QSFP-4SFP10G-CU1M, QSFP-4SFP10G-CU3M, QSFP-4SFP10G-CU5M) are not
supported on the following modules:
– N7K-M206FQ-23L
– N7K-F312FQ-25
– N77-F324FQ-25
The workaround to this limitation is to use active optical cables (QSFP-H40G-AOC1M,
QSFP-H40G-AOC3M, QSFP-H40G-AOC5M) and active optical breakout cables
(QSFP-4X10G-AOC1M, QSFP-4X10G-AOC3M, QSFP-4X10G-AOC5M).
The passive optics (N7K M3 40G, N77 M3 40G, and N77 M3 100G) are not supported on the following
modules:
– N7K-M324FQ-25L
– N77-M324FQ-25L
– N77-M312CQ-26L
VLAN translation on fabric extender is not supported. If you need to map a VLAN, you must move the
interface to the parent switch and then configure the VLAN translation on the switches directly. The
VLAN translation configuration is applicable for trunk ports connecting two data centers.
The no hardware ejector enable Command is Not Recommended for Long-Term Use
The no hardware ejector enable command cannot be configured and persistently saved in the startup
configuration. This command is intended for temporary usage.
To work around this limitation, do not physically remove an active supervisor. Instead, use the system
switchover command to switch to the standby supervisor.
This applies only to the Cisco Nexus 7700 Series switches.
Because a VLAN configuration can be learned from the network while the VLAN Trunking Protocol
(VTP) is in a server/client mode, the VLAN configuration is not stored in the running configuration. If
you copy the running configuration to a file and apply this configuration at a later point, including after
a switch reload, the VLANs will not be restored. However, the VLAN configuration will be erased if the
switch is the only server in the VTP domain.
To work around this limitation, perform one of the following tasks:
• Configure one of the clients as the server.
• Complete these steps:
1. Copy the VTP data file to the bootflash: data file by executing the copy vtp-datafile
bootflash:vtp-datafile command.
2. Copy the ASCII configuration to the startup configuration by executing the copy ascii-cfg-file
startup-config command.
3. Reload the switch.
This limitation does not apply to a binary configuration, which is the recommended approach, only for
an ASCII configuration.
To support the coexistence of an F2e Series module with an M Series module in the same VDC, the F2e
Series module operates in a proxy mode so that all the Layer 3 traffic is sent to an M Series module in
the same VDC. For F2e proxy mode, having routing adjacencies connected through F2e interfaces with
an M1 Series module is not supported. However, routing adjacencies connected through F2e interfaces
with an M2 Series module is supported.
Copying a file to the running configuration can trigger an error and the following message is displayed:
This issue might occur if the configuration contains SNMP-related configurations to send traps or
notifications, and if the file that is to be copied to the running configuration contains only EXEC show
commands.
When the following message is displayed, enter y.
“This command will reboot the system. (y/n)? [n] y.”
Note that there is no operational impact and no configuration loss when the switch reloads.
LISP Traffic
A Layer 3 link is required between aggregation switches when deploying LISP host mobility on
redundant LISP Tunnel Routers (xTRs) that are a part of a vPC. In rare (but possible) scenarios, failure
to deploy this Layer 3 link might result in traffic being moved to the CPU and potentially dropped by the
Control Plane Policing (CoPP) rate limiters.
The standby supervisor might reload when a feature-set operation (install, uninstall, enable, or disable)
is performed if the high availability (HA) state of the standby supervisor is not “HA standby” at the time
of the feature-set operation. To prevent the reload, ensure that the state of the standby supervisor is “HA
standby.” To check the HA state for the specific virtual device context (VDC) where the feature-set
operation is performed, enter the show system redundancy ha status command on the active supervisor.
A reload of the standby supervisor has no operational impact because the active supervisor is not
affected.
In addition, if you perform a feature-set operation while modules are in the process of coming up, then
those modules are power cycled. Modules that are up and in the OK state are not power cycled when you
perform a feature-set operation.
Uneven load balancing of flood traffic occurs when you have a seven-member port channel. This
behavior is expected, and occurs on all M Series and F Series modules. In addition, M Series modules
do not support Result Bundle Hash (RBH) distribution for multicast traffic.
This error is benign. To avoid the error, disable BFD on the multicast tunnel interface (MTI) interface.
For every multicast domain of which an multicast VRF is a part, the PE router creates a MTI. MTI is an
interface the multicast VRF uses to access the multicast domain.
You can configure role-based access control (RBAC) in the Cisco Nexus 7000 storage VDC using Cisco
NX-OS CLI commands. You cannot configure RBAC in the Cisco Nexus 7000 storage VDC using Cisco
Data Center Network Manager (DCNM). Note that RBAC in the storage VDC and in the Cisco Nexus
7000 Series switches is the same, which is different from that for the Cisco MDS 9500 Series Multilayer
Directors.
RBAC CLI scripts used in Cisco MDS 9500 Series Multilayer Directors cannot be applied to the storage
VDC configured for a Cisco Nexus 7000 Series switch.
You cannot distribute the RBAC configuration between a Cisco MDS 9500 Series switch and the storage
VDC configured for a Cisco Nexus 7000 Series switch. To prevent this distribution, assign RBAC in
Cisco MDS and the Cisco Nexus 7000 storage VDC to different Cisco Fabric Services (CFS) regions.
The M Series modules support only 7 entries for Layer-4 protocols (L4Ops).
F2 Series I/O modules do not support per-VLAN statistics. Therefore, the show interface command will
not display per-VLAN Rx or Tx counters or statistics for switch virtual interfaces (SVIs).
F3 Series I/O modules require a dot1q header to be present for proper processing and transport of
SGT-tagged packets. For Layer 2 switch ports use trunked interfaces instead of an access VLAN. Layer
3 interfaces should be configured as an L3 subinterface to force the dot1q over the L3 interconnection.
When a fabric module is power cycled or removed momentarily during an online insertion and removal
(OIR) from slot 5 or slot 6 on a Cisco Nexus 7700 switch, packet drops can occur. This limitation is not
applicable to Cisco Nexus 7702 Switches.
When traffic ingresses from a module on the Cisco Nexus 7700 switch at a rate much below the line rate,
uniform fabric utilization does not occur across the fabric modules. This behavior is expected and
reflects normal operation based on the fabric autospreading technology used in the Cisco Nexus 7700
switch.
When you change the interface MTU on a fabric port, the configured MTU on the FEX ports are not
configured to the same value. This issue occurs when the interface MTU changes on a fabric port.
The configured MTU for the FEX ports is controlled by the network QoS policy. To change the MTU
that is configured on the FEX ports, modify the network QoS policy to also change when the fabric port
MTU is changed.
Multicast traffic that is sent to Optimized Multicast Flooding (OMF) Local Targeting Logic (LTL) is
forwarded to FEX ports that are not a part of the bridge domain (BD). This issue occurs when multicast
traffic is sent to OMF LTL, which occurs if an unknown unicast flooding occurs when OMF is enabled.
FEX interfaces can support multicast routers, but OMF must be disabled on those VLANs. If there is a
multicast MAC address mismatch on the VLAN, traffic will be flooded in the VLAN and will eventually
reach the router behind the FEX port.
If an ASCII configuration has incompatible ports, such as when the configuration is created with ports
that are added to an FEX from different modules or VDC types, the ports might be added without
warnings.
When connecting F2 Series ports to the same FEX, make sure the VDC type is the same as in the source
configuration that is being replicated.
DHCP snooping is not supported when the vPC+ FEX feature is enabled.
Note Do not change any configuration settings or network settings during a software upgrade. Changes to the
network settings might cause a disruptive upgrade.
Releases that are not listed for a particular release train do not support a direct ISSU.
Note Only the ISSU paths/combinations in Table 5 have been tested and are supported.
Table 5 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.2(2))
Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.2(2) 8.2(1)
8.1(2a)
8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(3)
7.3(2)D1(2)
7.3(2)D1(1)
Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 5, a reload is required.
Note Only the ISSU paths/combinations in Table 6 have been tested and are supported.
Table 6 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.1(2a))
Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.1(2a) 8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(3)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 6, a reload is required.
Note Only the ISSU paths/combinations in Table 7 have been tested and are supported.
Table 7 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.1(2))
Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.1(2) 8.1(1)
8.0(1)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 7, a reload is required.
Note Only the ISSU paths/combinations in Table 8 have been tested and are supported.
Table 8 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.2(1))
Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.2(1) 8.1(1)
8.0(1)
7.3(2)D1(1)
Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 8, a reload is required.
Note Only the ISSU combinations in the following table, Table 9 have been tested and are supported.
Table 9 Supported ISSU Paths for the Cisco Nexus 7000 and Cisco Nexus 7700 Series Chassis
(Cisco NX-OS Release 8.1(1)
Current Release
Supporting Direct ISSU
Target Release Upgrade to Target Release
Cisco NX-OS Release 8.0(1)
8.1(1) 7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
Note Multi-hop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 9, a reload is required.
Note Only the ISSU combinations in the following table, Table 10 have been tested and are supported.
Table 10 Supported ISSU Paths for the Cisco Nexus 7000 and 7700 Series Chassis (Cisco
NX-OS Release 8.0(1)
Current Release
Supporting Direct ISSU
Target Release Upgrade to Target Release
Cisco NX-OS Release 7.3(1)D1(1)
8.0(1)
7.3(0)DX(1)
7.3(0)D1(1)
Note Multi-hop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 10, a reload is required.
ISSU Upgrade
To perform an ISSU to Cisco NX-OS Release 8.0(1) and later releases, follow these steps:
1. Enter the show running-config aclmgr inactive-if-config command for all VDCs.
2. Enter the clear inactive-config acl command for all VDCs.
3. If the configuration has any mac packet-classify configurations on any interfaces, remove all of the
configurations by entering the no mac packet-classify command.
4. Start the ISSU procedure.
• The CoPP statistics accumulated before ISSU to Cisco NX-OS Release 8.1(1) are not retained after
the ISSU. If you want to retain the CoPP statistics from earlier releases, back it up before you
perform the ISSU to Cisco NX-OS Release 8.1(1).
• When you perform ISSU in a set up where the Routing Information Protocol (RIP) has dependency
on other protocols for redistribution, you should adjust the RIP timers because RIP does not support
stateful restart. Use the timers basic update invalid holddown flush command in the
address-family-mode under the router configuration mode to adjust the timer values.
• ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with RISE
configuration:
– RISE configuration must be removed prior to starting your upgrade to Cisco NX-OS Release
8.0(1). ISSU performs compatibility check and blocks the upgrade if RISE is configured.
• If the RISE feature is not configured, there is no impact on the ISSU.
• If the RISE feature is configured you will be prompted to remove this feature in order to
proceed with the ISSU. You can proceed with the upgrade only after you disable this feature.
– Sample CLI output:
"Running-config contains configuration that is incompatible with the new
image (strict incompatibility).
Please run 'show incompatibility-all system <image>' command to find out
which feature needs to be disabled.”.
Pre-upgrade check failed. Return code 0x40930029 (Current running-config is
not supported by new image).
switch# show incompatibility-all system n7000-s2-dk9.8.0.1.bin
• ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with VXLAN
configuration in a vPC setup:
ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with VXLAN
configuration in a vPC setup can result in a traffic loss when the second vPC peer is upgraded.
The following upgrade steps are recommended as the workaround for this issue:
– Shutdown vPC on the vPC secondary and reload with 8.0(1).
– Perform no shut vpc after the system is operational,
– Perform a vPC role change so that vPC secondary becomes a vPC primary.
– Shutdown vPC on the other peer that is still running 7.3 release and reload with 8.0(1).
– Perform no shut vpc after the system is operational,
– Optionally, a vPC role change can be performed to get the latest peer back to vPC primary.
• If ISSU fails during a FEX module upgrade, you need to clear the flash as per the following steps
and then proceed with the upgrade:
– rlogin to the failing FEX—rlogin 192.0.2.<FEX-ID> -l root
– umount /mnt/cfg
– flash_eraseall /dev/mtd5
– mount -t jffs2 -rw /dev/mtdblock5 /mnt/cfg
The mount command enables you to mount a file from a source folder to a destination folder.
• FCoE FEX
– After ISSU upgrade, you must change the port-channel load balance for FEX, that is, from
default VDC, in order to apply load balancing for SAN traffic:
Cisco NX-OS Release 8.1(2a) supports the following cold boot support matrix
Cisco NX-OS Release 8.1(2) supports the following cold boot support matrix:
Cisco NX-OS Release 8.2(1) supports the following cold boot support matrix:
Cisco NX-OS Release 8.1(1) has the following cold boot support matrix:
Cisco NX-OS Release 8.0(1) has the following cold boot support matrix:
To perform a non-ISSU upgrade (cold boot upgrade) to Cisco NX-OS Release 8.0(1) and later releases
from any prior supported releases in Table 16 follow these steps:
1. Change the boot variable, as shown here:
Note Allow some time after the reload for the configuration to be applied.
Reload based NXOS downgrades involve rebuilding the internal binary configuration from the
text-based startup configuration. This is done to ensure compatibility between the binary configuration
and the downgraded software version. As a result, certain specific configuration may be missing from
the configuration, after downgrade, due to ASCII replay process. This would include FEX HIF port
configuration and VTP database configuration. Furthermore, NX-OS configurations that require VDC
or switch reload to take effect may require additional reload when applied during the downgrade process.
Examples of this include URIB/MRIB shared memory tuning, custom reserved VLAN range and
Fabricpath Transit Mode feature. In order to mitigate this during downgrade, you should copy your full
configuration to bootflash/tftpserver.
Feature Support:
Any features introduced in a release must be disabled before downgrading to a release that does not
support those features.
Unsupported Modules:
When manually downgrading from a Cisco NX-OS Release to an earlier release, first power down all
modules that are unsupported in the downgrade image. Then, purge the configuration of the unsupported
modules using the purge module module_number running-config command.
For complete instructions on upgrading your software, see the Cisco Nexus 7000 Series NX-OS Upgrade
Downgrade Guide.
Note If you boot up the switch without any startup configuration, this limitation might apply to an ASCII
replay. The reason is that without a startup configuration, the default VDC might still have certain
interfaces automatically allocated. Because of this possibility, follow the approaches to work around the
limitation.
• n7700-s2-epld.8.0.1.img
Table 11 shows the modules that are supported in Cisco NX-OS Release 8.0(1), Cisco NX-OS Release
8.1(1), and Cisco NX-OS Release 8.2(1):
Table 17 Supported Modules with the FPGA in Cisco NX-OS Releases 8.0(1), 8.1(1), and 8.2(1)
Module FPGA Type Version
Cisco Nexus 7000 PMFPGA 37.000
Supervisor 2 IOFPGA 1.013
Cisco Nexus 7700 PMFPGA 20.000
Supervisor 2E
Fan-10 slot chassis (Cisco FAN 0.007
Nexus 7000 Series)
Fan-18 slot chassis (Cisco FAN 0.002
Nexus 7000 Series)
Fan-9 slot chassis (Cisco FAN 0.009
Nexus 7000 Series)
Fan-4 slot chassis (Cisco FAN 0.005
Nexus 7000 Series)
Fan-18 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-10 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-6 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-2 slot chassis (Cisco FAN 0.016
Nexus 7700 Series)
9 slot chassis PMFPGA 1.003
(N7K:FAB2-7009)
10 slot chassis PMFPGA 0.007
(N7K:FAB2-7010)
18 slot chassis PMFPGA 0.007
(N7K:FAB2-7018)
6 slot chassis PMFPGA 1.002
(N77:FAB2-7706)
10 slot chassis PMFPGA 1.003
(N77:FAB2-7710)
18 slot chassis PMFPGA 1.002
(N77:FAB2-7718)
6 slot chassis PMFPGA 0.001
(N77:FAB3-7706)
10 slot chassis PMFPGA 0.001
(N77:FAB3-7710)
18 slot chassis PMFPGA 9.008
(N77:FAB3-7718)
For more information about upgrading to a new EPLD image, see the Cisco Nexus 7000 Series
FPGA/EPLD Upgrade Release Notes, Release 8.x.
Cisco Nexus 7700 switches have an EPLD image that is programmed on the switches. This EPLD image
is different than the EPLD image for the Cisco Nexus 7000 switches.
New Hardware
This section briefly describes the new hardware and hardware enhancements introduced in Cisco NX-OS
Release 8.2(1), Cisco NX-OS Release 8.1(1) and in Cisco NX-OS Release 8.0(1). For detailed
information about the new hardware, see the Cisco Nexus 7000 Series Hardware Installation and
Reference Guide.
From Cisco NX-OS Release 8.2(1), the Cisco Nexus B22 Fabric Extender (N2K-B22DELL-P) and the
Cisco Nexus Fabric Extender, N2k-C2348TQ-E are supported on the F3 Series and M3 Series I/O
modules.
The 38mm fans do not meet NEBS compliance when the Cisco Nexus 7700 12-port 100-Gigabit Ethernet
I/O Module (N77-M312CQ-26L) is used in a Nexus 7700 6-slot, 10-slot, or 18-slot chassis. The new
76mm fans are required to meet NEBS compliance when the M3 12-port 100 Gigabit I/O Module
(N77-M312CQ-26L) is used in a Nexus 7700 6-slot, 10-slot, or 18-slot chassis.
• Cisco Nexus 7706 Fan (PID: N77-C7706-FAN-2)
Starting from Cisco NX-OS Release 8.1(1), the following M3-Series I/O modules are supported on the
Cisco Nexus 7004 switch:
• 48-port 1-/10-Gigabit Ethernet SFP+ I/O module (N7K-M348XP-25L)
• 24-port 40-Gigabit Ethernet QSFP+ I/O module (N7K-M324FQ-25L)
The QSFP-100G-PSM4-S transceiver is supported with the M3-Series 12-Port 100-Gigabit Ethernet
(N77-M312-CQ-26L) I/O module.
Starting with Cisco NX-OS Release 8.0(1), the QSFP-4X10G-AOC transceiver with the 40GBASE-AOC
QSFP+ to four SFP+ breakout cable type is supported on the M3-Series 24-Port 10-/40-Gigabit Ethernet
I/O modules.
M3 Laser on Support
Starting with Cisco NX-OS Release 8.0(1), Laser-On support is available on the M3-Series modules.
From Cisco NX-OS Release 8.2(1), you can configure the Intelligent CAM (iCAM) analytics and
machine-learning monitor interval and obtain the following traffic analytics on TCAM entries and
resources:
• Current, Historical, and Predictive Analytics for traffic per hardware table entry. For example, per
TCAM-entry traffic.
• Current, Historical and Predictive Analytics for hardware table utilization per feature.
• Top/Bottom X% hitters, sorting, filtering, based on traffic.
• Historical analytics provide history of traffic for a past date/time.
• Predictive traffic analytics provides traffic for a future date/time.
iCAM provides the above listed analytics for the following features:
• ACL, QoS, PBR, CoPP, WCCP, VACL, PACL, NAT, and so on about 32 features and combinations
of these features.
• Forwarding tables.
• Multicast tables.
GUI for iCAM is available in DCNM as an experimental feature (click on Monitor --> iCAM).
MKA
MACsec is a standard, which can be set up using Cisco security association (SA) protocol or MACsec
Key Agreement (MKA). The SA protocol was used to set up the MACsec standard prior to Cisco NX-OS
Release 8.2(1). MACsec can also use the MKA protocol in Cisco NX-OS Release 8.2(1) to exchange
session keys and manage encryption keys. MKA is supported only on physical ports and port channels.
MKA supports the following point-to-point use cases:
• Securing Data Center Interconnect (DCI)
• Securing Provider Edge (PE)-to-Customer Edge (CE) links in Multiprotocol Label Switching
(MPLS) network
• Securing PE-to-PE using dark fiber
• Securing CE-to-CE using an MPLS or Virtual Private LAN Services (VPLS) network
• MACSec on port channels
Using MKA, you can also secure a CE to multiple CEs using an MPLS or VPLS network, which is a
point-to-multi point deployment.
From Cisco NX-OS Release 8.2(1), the Flexible ACL TCAM Bank Chaining feature is supported on the
M2 Series modules.
From Cisco NX-OS Release 8.2(1), you can use the ip dhcp redirect-response command on the DHCP
server-facing interface to redirect the packets to the correct switch. When you enable this command, the
relay agent on a border node includes source locater and VNI ID of the client segment as remote ID
option in request packets, and relays it to the DHCP server. When the DHCP server sends the OFFER
packets, the border node uses the information from the same remote ID option to create a VXLAN
header. This header includes the source locater set as the outer destination address and the VNI ID of the
client segment. This helps the border node to send the OFFER packet to the correct switch.
The congestion drop timeout and pause frame timeout commands are modified for FCoE to align with
the commands used in Fibre Channel.
The following commands are modified:
• Congestion drop timeout command has changed from system default interface congestion timeout
milliseconds mode {core | edge} to system timeout fcoe congestion-drop {milliseconds | default}
mode {core | edge}.
• Pause frame timeout command has changed from system default interface pause timeout
milliseconds mode {core | edge} to system timeout fcoe pause-drop {milliseconds | default} mode
{core | edge}.
Connecting Data Center Fabrics with VXLAN BGP EVPN and OTV
This feature enables you to configure VXLAN and OTV on the same device (a single-box solution). The
VXLAN and OTV overlays are stitched together in the device, ensuring that the Layer-2 traffic between
the tunnels is within the bridge domain.
VXLAN fabric supports external connectivity. Data centers in different sites can be connected using the
Data Center Interconnect (DCI) functionality. In the MPLS hand off scenario, the VXLAN encapped
packet is terminated and reoriginated to MPLS.
ACI WAN Interconnect feature is supported on M3 modules in Cisco NX-OS Release 8.2(1).
Policy-based routing (PBR) support is provided for the VXLAN BGP EVPN fabric. PBR allows you to
configure a defined policy for IPv4 and IPv6 traffic flows, lessening the reliance on routes derived from
the routing protocols. All the packets received on an interface with policy-based routing enabled are
passed through enhanced packet filters or route maps. The route maps dictate the policy, determining the
destination to forward packets. PBR configurations have to be enabled on relevant ToR or leaf switches,
and spine switches in the VXLAN BGP EVPN fabric.
Network plug and play (PnP) is a software application that runs on a Cisco Nexus 7000 switch. The PnP
feature provides a simple, secure, unified, and integrated offering to ease new branch or campus
roll-outs, and for provisioning updates to an existing network. This feature provides a unified approach
to provision networks that comprise different devices with a near zero-touch deployment experience.
Consistency checker compares the software state with the hardware state in a module and if there is any
inconsistency, it flags the issue immediately. This helps to reduce troubleshooting time at a later period.
The consistency checker enables users to perform basic troubleshooting and identify issues before
reaching out to support teams for resolution thereby reducing the mean time to resolve issues.
Except for Persistent Storage Service (PSS) consistency checker all other features are supported since
Cisco NX-OS Release 8.0(1) and are enhanced in Cisco NX-OS Release 8.2(1). Consistency checker is
supported on M3 and F3 modules. Users can execute the show consistency-checker all command to
perform consistency check for all components/features.
The following consistency checker components are supported in Cisco NX-OS Release 8.2(1):
• FabricPath
• Interface-properties
• Layer 2 Unicast and Multicast Tables
• L3-Interface Tables
• Link-State
• Proxy Forwarding
• Spanning-Tree
• Persistent Storage Service (PSS)
Distributed Packet Tracer (DPT) enables users to find and track specific traffic flow across all network
devices from a single-point server or network controller or network management system (NMS).
The DPT framework uses a central controller device (CCD) to communicate with an on-switch software
module called On-Switch-DPT. The CCD gets the input from the network administrator to trace a given
packet in a network. CCD then communicates this information to each of the switches in the network.
The On-Switch-DPT traces the packet and passes the information to CCD.
The CCD then collates all the information from various switches and analyzes them before presenting
the result to users.
Configure Replace
The Configure Replace (CR) feature enables a Nexus 7000 Series switch to replace the running
configuration with a user provided configuration without reloading. Device reload may be required only
when a configuration itself requires a reload. A user provided configuration is running configuration
taken from a Cisco NXOS switch. CR replaces the entire running configuration with new configuration
provided by a user. In case of failure in CR the original configuration is restored in the switch.
From Cisco NX-OS Release 8.2(1), all Cisco Nexus 7000 Series I/O modules support hardware
forwarding of IP-directed broadcast packets. This feature is limited to the virtual device contexts (VDC)
on which this feature is applied. You cannot configure both software and hardware forwarding of
IP-directed broadcast packets on the same interface.
From Cisco NX-OS Release 8.2(1), Layer 3 routing over vPC is supported in the M3 Series I/O modules
for IPv6 unicast traffic.
The IP TCP Maximum Segment Size (MSS) feature enables the configuration of a maximum segment
size for all TCP connections that originate from or are terminated in a Cisco Nexus 7000 Series switch.
From Cisco NX-OS Release 8.2(1), Precision Time Protocol (PTP) can be enabled in the M3 Series I/O
modules.
Catena
Catena works in transparent, routed, and mixed modes, which means each Catena instance can forward
traffic through a mix of Layer 2 and Layer 3 devices. Failover using probing is supported for traffic
redirection. Catena solution supports hash-based load balancing across appliances in the transparent
mode.
Data flow through these appliances is based on traffic type which is qualified by access control lists.
Each Catena service contains many chains of appliances, and each chain of appliance contains many
sequences of access-lists based on vlan-group, port-group, and device-group identifiers.
Subscription-based Licensing
From Cisco NX-OS Release 8.2(1), subscription-based licensing is available on Cisco Nexus 7000
Series switches. This enables the user to purchase licenses for any period of time.
From Cisco NX-OS Release 8.2(1), the Intelligent CAM Analytics and Machine-learning (iCAM)
feature is available under the ENHANCED_LAYER2_PKG license.
From Cisco NX-OS Release 8.2(1), all Virtual Private LAN Service (VPLS) functionalities, except
Ethernet Flow Points, (EFP), service instances and bridge domains, are supported in the M3 Series I/O
modules.
From Cisco NX-OS Release 8.2(1), all Ethernet over Multiprotocol Label Switching (EoMPLS)
functionalities, except EFPs, service instances and bridge domains, are supported in the M3 Series I/O
modules.
From Cisco NX-OS Release 8.2(1), Cisco Nexus 7000 Series switches support Private VLAN (PVLAN)
that is extended over the Overlay Transport Virtualization (OTV) overlay. This allows a device to extend
Layer 2 VLANs across Layer 3 IP networks. Transmission occurs in a Layer2 frame attached to a Layer
3 header. In an OTV overlay, this feature allows two VLANs to communicate, based on the PVLAN
association.
From Cisco NX-OS Release 8.2(1), Cisco Nexus 7000 Series switches aim to achieve sub-sec
convergence delay for 16K (S, G) running on F3 and M3 Modules, using the Multicast only Fast
Re-Route (MoFRR) feature. This feature allows faster programming and improved convergence.
From Cisco NX-OS Release 8.2(1) Web Cache Communication Protocol (WCCP) version 2 feature is
supported on bridge domain interfaces (BDIs) as an ingress feature.
HTTP probes are supported to probe each node periodically to monitor their health.
With multicast extranet, the RPF lookup for multicast route in the receiver VRF can be carried out in a
source VRF, thereby allowing the return of a valid RPF interface. This forms a source or RP tree from
the receiver VRF to the source VRF, thus enabling the traffic originating from the source VRF to be
forwarded to the OIFs in the receiver VRF.
IPv6 Support
From Cisco NX-OS Release 8.2(1), you can configure peer-keepalive link using an IPv4 or IPv6 address.
ITD on M3
From Cisco NX-OS Release 8.2(1), Intelligent Traffic Director (ITD) is supported on M3 modules.
From Cisco NX-OS Release 8.2(1), Locator/ID Separation Protocol (LISP) is supported on M3 modules.
From Cisco NX-OS Release 8.2(1), the ITD VIP knob for static route feature allows you to configure a
Virtual IP Address (VIP) for ITD device group, with route creation based on the health of a device group
node. With a VIP knob, creation and deletion of routes is automatic and is triggered based on the health
of the ITD device group.
From Cisco NX-OS Release 8.1(1), M3 Series modules are supported for FEX.
The Disjoint Routing Locator (RLOC) feature facilitates inter-fabric LISP traffic support by ensuring
that the LISP mapping system is aware of multiple fabrics. Each fabric is defined by a locator scope that
groups a range of RLOC (or fabric underlay) addresses that routers within the fabric are associated with.
From Cisco NX-OS release 8.1(1), routing over vPC for IPv4 unicast traffic is supported on the M3
Series modules.
M3 FabricPath
From Cisco NX-OS Release 8.1(1), FabricPath is supported on the M3 Series modules.
From Cisco NX-OS release 8.1(1), you can exempt the Layer 2 (L2) control plane protocols from SGT
tagging when interlinking with ports.
This is to ensure that the packets from L2 control protocols are transmitted untagged from Ethernet peers
to ports.
The Bidirectional Forwarding Detection (BFD) Multi-hop feature enables detection of IPv4 network
failure between paths that are not directly connected. This feature also enables users to configure IPv4
BFD sessions over multi-hop routes.
If a BFD session is up (that is, the next-hop destination is reachable), IPv4 static routes that are
associated with IPv4 static BFD configuration are added to a routing table. If the BFD session is down,
the routing table removes all associated static routes from the routing table.
BFD notifies BGP when the path goes down. The path to reach the destination (BGP neighbor) is through
a static route only (with no IGP support).
The multi-hop BFD feature supports only the static routes in Cisco NX-OS release 8.1(1),
VXLAN Fabric
VXLAN BGP EVPN fabrics with a Cisco Nexus 7000 Series border leaf switch having an M3 module
can use the MPLS L3VPN network for WAN connectivity or for Layer-3 Data Center Interconnect.
The VXLAN OAM – Ping functionality is used to detect errors and path failures for traffic from a
leaf/ToR switch VTEP to an attached end host, to another leaf/ToR switch VTEP, or to an end host
attached to a VTEP.
VXLAN OAM – Traceroute/Pathtrace functionality is used for fault isolation in the VXLAN overlay.
Traceroute is an ICMP based solution that provides more information regarding the ingress and egress
interface paths. The traceroute command uses ICMP packets (channel-1) to trace the path the packet
traverses in the VXLAN BGP EVPN fabric overlay, and the pathtrace command traces the path the
packet traverses in the VXLAN overlay using the NVO3 channel (channel-2).
This feature provides a provision to view interface and error verification statistics, when the pathtrace
function is used.
Pervasive Load Balancing (PLB) is a fabric feature that provides Layer-3 and Layer-4 load balancing at
terabits speed without the need for any virtual or physical external load balancer equipment. Servers,
VMs and containers (specific to a given service) attached to different ToR/leaf switches might be
distributed across the fabric and this feature enables the switching fabric to load balance client-specific
service requests to these servers.
In this feature, the same virtual IP (VIP) is assigned to the group of servers that might be distributed
across the fabric. When different clients (local to the fabric or from a remote location) send requests for
a given service, these requests are destined to the VIP of these servers.
In the fabric, ToR/leaf switches matches these clients’ IP address bits/mask, the VIP and relevant
Layer3/Layer4 fields to load balance these requests among the servers.
iCAM can be used to view historical TCAM data. iCAM analyses this historical data using machine
learning algorithms to predict TCAM usage and traffic stats at a future date and time.
Catena
This feature helps in chaining of devices so that packets are redirected through multiple devices. These
devices can be appliances like firewall, IPS, IDS and Load balancer, and so on. The devices are inserted
in the data path in such a way that there are no topological changes, or changes to existing configuration.
This feature can support scalability with many number of appliances in the data path.
Data flow through these appliances is based on traffic type which is qualified by access control lists.
Each Catena service contains many chains of appliances, and each chain of appliance contains many
sequences of access-lists based on vlan-group and port-group identifiers.
VPNv4 Multipath
The VPN Multipath Support for Inter-AS VPNs feature enables the switch to pick one path as the best
path and mark the other legitimate paths between Autonomous System Boundary Routers (ASBRs) as
multi path. This feature enables load sharing of traffic among the different multi paths and the best path
to reach the destination.
GIR Enhancements
A delay has been added before the after_maintenance snapshot is taken. A visible CLI indicator has been
added to display when the system is in the maintenance mode. Support for SNMP traps has been added
when the device moves from the maintenance mode to the normal mode and vice-versa through CLI
reload, or system reset.
IPv6 RA Guard
The IPv6 RA Guard feature provides support for allowing the network administrator to block or reject
unwanted or rogue router advertisement (RA) guard messages that arrive at the network device platform.
DHCPv6 Guard
The DHCPv6 Guard feature blocks reply and advertisement messages that come from unauthorized
DHCP servers and relay agents.
IPv6 Snooping
The IPv6 Snooping feature bundles several Layer 2 IPv6 first-hop security features, including IPv6
neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table
recovery, to provide security and scalability. IPv6 ND inspection operates at Layer 2, or between Layer
2 and Layer 3, to provide IPv6 functions with security and scalability.
SXPv4
Cisco TrustSec SXP version 4 (SXPv4) enhances the functionality of SXP by adding a loop detection
and prevention mechanism to prevent stale binding in the network. In addition, Cisco TrustSec with
SXPv4 supports SGT inline tagging, which allows propagation of SGT embedded in clear-text
(unencrypted) Ethernet packets.
Smart Licensing
Smart Licensing is a cloud-based approach to licensing. The solution simplifies the purchase,
deployment and management of Cisco software assets. Entitlements are purchased through your Cisco
account like Cisco Commerce Workspace (CCW) and immediately deposited into your Virtual Account
for usage. This eliminates the need to install license files on every device. Products that are smart
enabled communicate directly to Cisco to report consumption. The primary location to manage product
registration and monitor smart license consumption is the Cisco Smart Software Manager (CSSM).
License ownership and consumption are readily available to help make better purchase decision based
on consumption or other business needs.
MTS Serviceability
The message and transaction service (MTS) is a high-performance interprocess communications (IPC)
message broker that specializes in high-availability semantics. MTS handles message routing and
queuing between services on and across modules and between supervisors. MTS facilitates the exchange
of messages such as event notification, synchronization, and message persistency between system
services and system components. MTS can maintain persistent messages and logged messages in queues
for access even after a service restart.
MTS provides extensive serviceability features. For instance, MTS provides notifications to inform an
application when its queue has reached a predefined limitation. Corresponding to each notification, a
default callback action is defined in MTS. From Cisco NX-OS Release 8.0(1), the System Message
Logging contains new logs that indicates the highest MTS memory users. These logs are set to severity
level 4. In addition, detailed memory usage stats with timestamps are collected per application. You can
use the command show sys int mts sup sap APP_SAP_NUM queue_stats to collect the technical
support, if an application contains an issue.
IPSLA IPv6
IPv6 support has been added for the ICMP Echo operations.
Link OAM
Link OAM is supported only on F2+M3 modules. This feature allows service providers to monitor and
troubleshoot a single physical point-to-point Ethernet link. Service providers can monitor specific
events, take actions on events, and troubleshoot. Ethernet link OAM operates on a single, physical link
and it can be configured to monitor either side or both sides of that link.
Consistency Checker
Consistency checker is a tool that checks for system consistency, helps in root cause analysis and fault
isolation, checks for software versus hardware programming, and includes on demand trigger through
CLI.
Fault Management (Trigger Based Auto Capture of Logs and MTS Statistics Collection)
The Fault-Management System is used to enhance the Cisco NX-OS serviceability by providing an
efficient means to capture data relevant and adequate to debug issues being reported at the earliest
possible time, without any manual intervention.
Enhancements to NX-API
Cisco NX-API allows HTTP-based programmatic access to the Cisco Nexus platform. NX-API extends
the capability of running CLIs for configuration management using HTTP/HTTPS. NX-API embeds the
commands into the body of XML, JSON or JSONRPC requests and executes them by spawning VSH
sessions.
The following enhancements have been made to NX-API:
• Configuration Validation—Allows you to validate the commands before applying them on the
switch. This feature will enable you to verify the consistency of a configuration.
– Validate-Only—Validates the configuration only; will not set the configuration.
– Validate-and-Set—Validates the configuration, if successful it applies the configuration on the
switch.
• Configuration Lock—Allows you to set an exclusive lock on the configuration; no other
management or programming agent will be able to modify the configuration if this lock is held.
• Checkpoint-Rollback—In case a CLI from a batch of configuration performed through NX-API
fails, you can ask for stop-on-error, continue-on-error or rollback-on-error while configuring.
– Stop-on-error—Stops on the first CLI that fails.
– Continue-on-error—Ignores and continues with other CLIs.
– Rollback-on-error—Rolls back to the previous state the system had before executing the
commands
• Command Live Reference—Displays the schema (i.e. the description of the keywords) for the CLIs
on NX-API Web Interface.
• Generation of Java and JavaScript—Generates the Java code/JavaScript for each of the request
posted through the sandbox.
ITD Enhancements
• The fail action bucket distribute and fail action mode least-bucket commands have been
introduced to specify how traffic is reassigned after a node failure.
• Added optimized addition or deletion of ACEs in include or exclude ACLs.
Scale Enhancements
• Cisco NX-OS Release 7.3(0)DX(1) and 7.3(1)D1(1) have support for Inter AS option B on M3
modules with 150,000 labels.
• When M2 and M3 are used in the same VDC, the supported scale in the VDC is 150,000.
• From Cisco NX-OS Release 8.0(1) onwards up to 500,000 routing entries are supported on the M3
modules for Inter AS Option B.
• Number of VRFs for hand off (MP-BGP) in a M3 module is 4000.
• On Cisco Nexus 7000 Series Switches with M3 modules, you can scale HSRP Multiple Group
Optimization (MGO) up to 8000 HSRP groups.
Note: You must create a custom control plane policing (CoPP) policy to change the Committed
Information Rate (CIR) to allow more control plane packets.
Change the u6route-mem command value for VDC from 64 to the default value of 24.
Refer to Cisco Nexus 7000 Series NX-OS Verified Scalability Guide for other Cisco NX-OS Release
8.0(1) scale enhancements.
MIBs
No new MIBs are added for Cisco NXOS Release 8.0(1) and for Cisco NXOS Release 8.1(1).
Licensing
Smart Licensing feature is introduced in Cisco NX-OS Release 8.0(1).
Smart Licensing is a cloud-based approach to licensing. The solution simplifies the purchase,
deployment and management of Cisco software assets.
Refer to the “Smart Licensing Chapter” in the Cisco NX-OS Licensing Guide. for more details on the
Smart Licensing feature.
For details on licensing information for earlier releases, see the “Licensing Cisco NX-OS Software
Features” chapter in the Cisco NX-OS Licensing Guide.
Caveats
The following topics provide a list of open and resolved caveats:
• Open Caveats—Cisco NX-OS Release 8.2(2)
• Open Caveats—Cisco NX-OS Release 8.1(2)
• Open Caveats—Cisco NX-OS Release 8.2(1)
• Open Caveats—Cisco NX-OS Release 8.1(1)
• Open Caveats—Cisco NX-OS Release 8.0(1)
• Resolved Caveats—Cisco NX-OS Release 8.1(2a)
• Resolved Caveats—Cisco NX-OS Release 8.1(2)
• Resolved Caveats—Cisco NX-OS Release 8.2(1)
• Resolved Caveats—Cisco NX-OS Release 8.1(1)
• Resolved Caveats—Cisco NX-OS Release 8.0(1)
Note Release note information is sometimes updated after the product Release Notes document is published.
Use the Cisco Bug Toolkit to see the most up-to-date release note information for any caveat listed in
this document.
Identifier Description
CSCvi76590 Hitting cts_core at dl_iterate_phdr () from /lib/libc.so
CSCvb67954 EVPN to LISP hand off on Nexus7K does not work in NX-OS 7.3
CSCvi27159 S-N LISP traffic from ACI POD to remote WAN router is dropped on M3
GOLF module
CSCvi56044 IPFIB cores with BGP shut/no shut after ISSU from NX-OS 7.3.2 to NX-OS
8.2.2
Identifier Description
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases
Identifier Description
CSCvf85676 XML validation failed for DRAP commands on BH
CSCvf86735 xml validation failing for OAM show event-log commands
CSCvf81432 Schema validity error for 'show monitor session all' command
CSCvg07184 iCAM : icam prediction resource acl_tcam not working when enabled on
multiple modules
CSCvf87719 peer-local and peer-vdc commands not being nvgen
CSCvf81406 DLC status is missing in xml schema for "show license status"
CSCvf81421 schema validation error for licensing clis
CSCvf66631 LC Reload on Bidir ends with Extra packets
CSCvg05917 N77/vPC/MFDM: 2-3 secs mcast drop 10 secs after “vpc role preempt”
CSCvf62853 aclqos crash on F3 and M3
CSCvf86826 show otv isis commands throwing an error for validate-xml
Identifier Description
CSCvf99101 feature poap operation failed on response timeout from service which leads to
delay in POAP abort
CSCvf72890 ASCII-CFG-2-ACFG_OPER_FAIL: Ascii config/replay operation failed
because of Could not attach to clis
CSCvf85559 FP-ISIS validate-xml throwing an error for most of the option “Show
fabricpath isis”
CSCvf86400 kill lisp results in traffic loss
CSCvf84382 LISP cores at lisp_rt_send during de-configuration
CSCvf84373 LISP: lisp cores on cleaning up
CSCvf93507 nve oif removed after sso from S,G entry
CSCvg01021 VxLAN OTV: *,G has NULL OIF at the Leaf
CSCvf75002 Dont refresh type-5 LSA for which route is not present in RIB
CSCvf68532 ospf core at OSPF_IPC_MTS_THREAD post multiple process restarts
CSCvf28281 OSPFv2 area summarization does not happen after config-replace
CSCvf61367 SYSTEM UI:%URIB-3-NO_L3VM_INFO_ERROR message from sal client
CSCvf85079 banner motd" cmd stucks if it has message length more than 256.
CSCvf67914 KERN-2-SYSTEM_MSG: klm_sprom: sys_srv_register_multiple FAILED
(rc=-1)
CSCvg06181 Delayed VPC SVI bringup upon reload or MCT flap in scale environment
(900+ SVIs)
CSCvf85702 xml validation failed for some u2rib commands
CSCvf81873 killing netstack process deleting nve peers
CSCvf89452 Vxlan Fnl UI, traffic loss after completion of ISSU from 7.3.1 to 8.2(.23)
CSCvg09282 M3: Some layer2 tunneled multicast traffic getting mis-forwarded under
scaled condition
CSCvf72413 SDA::DHCP Server (shared across SDA and traditional) & Traditional DHCP
shouldn't be in same instance
CSCvg13589 source background script exits if its parent session is closed causing VOAP to
fail
CSCvf81747 M3: QSA (40G to 10G):SFP checksum error on inserting 40G-SR after
CVR-QSFP-SFP10G.
Identifier Description
CSCvc72202 CVR-QSFP-SFP10G goes down after the F3 module reload
CSCve98530 SYSTEM UI: xbar core during ISSU from 732 to 811
Identifier Description
CSCve98991 Packet drop during ISSU from release 7.3(x) release to 8.1(1)
CSCve18373 "show accounting log last-index " returns the incorrect value
CSCve18413 "show accounting log start-seqnum <seq num>" seems to be broken in 8.1(1)
CSCve06320 Netflow - msg stuck in MTS Buffer after ISSU
CSCve13677 N7K: M3 module crash in ncpinfraclnt service on IPv6 FIB update
CSCve07736 N7K Fabricpath - MAC address not re learnt on GARP
CSCvd48720 FCoE-ST: Tail drop seen on 10G F2E N77 FPC with 2348UPQ
CSCve16857 OSPF will change its router-id live without the process restarting in 7.3(1)D1(1)
CSCve19058 HMM does not restore hosts on cold boot from 7.2.2 to 8.1.1
CSCve15020 HMM SOO mode was not set right
CSCvc66384 MHBFD-ES: MH BFD sessions remain down on m2-m3 vdc if the sessions on
hosted on m3 lc
CSCvd41537 N7K - SNMP ciscoSwitchStatsMIB not populated
CSCve03125 Seeing duplicate packets after converting from vpc to vpc+
CSCvd81058 N77/PIM: Mcast duplication for local groups upon restoring peer-link
CSCve15198 multicast traffic failing after remove/add feature lisp
CSCve13327 MVPN Mcast block-hole after Core router reload (ASR9K)
CSCvd94102 Add of F3 as a SITE facing i/f triggers broadcast/Selective flood mac traffic drop
CSCvd52055 N77/MVPN: Mcast duplication upon P SSO
CSCvc91124 Issue with post migration of peer-link from M1 to M2
CSCvc50850 On a full scale EIGRP setup, nbrs flap with hold timer expiry
CSCvd98154 ACL is removed from SVI but remains programmed
CSCvc03136 BGP PIC convergence delays when a large number of interfaces are brought down
CSCve01811 vpc-config-sync fails with error message
CSCve05847 VRRPv3 crash in looped topology
CSCvd97431 stats not shown for violate class when run with per-inst option
CSCve22833 Increase memory usage running EEM+Python script and hang those with high
CPU usage after a few days.
CSCve02818 All multicast traffic dropped after vdc suspend/switchover/vdc resume.
Identifier Description
CSCvc72202 CVR-QSFP-SFP10G goes down after the F3 module reload
CSCvc34234 Large delay in getting new TLVs after ISSU in vPC causing BDs to go down.
Identifier Description
CSCvc59235 ARP Request packet reaching via VXLAN tunnel on a VPC leg is not being
forwarded to the VPC leg.
CSCvb86018 ACL: netflow PACL mac classify combo , traffic drop observed
CSCvc56810 Observing EPLD upgrade failed on N7718 Chassis during installation of FANs.
CSCvb93439 Host key verification failed,
CSCva65433 L2 FP BFD sessions not coming on M3 LC
CSCtx63124 bfd core in bfd_disc_node_comp_func
CSCvc34248 Memory leak in RTD monitor when getting ASLR info
CSCvc25628 Error after cold boot from 7.3.0.Dx to .8.0.
CSCvc37897 Per-if SGACL bypass feature does not work with Any-Any DENY rbacl
CSCvc32868 Switch not coming up with fabricpath license after licensing mode switch
CSCvb30907 static-host encap value displayed zero
CSCvc41428 icam does not account 2 entries for ipv6 for F3 and M3 modules
CSCvc13112 l2vpn traffic drop for EFP interfaces post ISSU from 730DX -> 8.0.0.26.S3
CSCvc42877 MPLS Scale testbed ISSU from 8.0.0.71.bin.S4 to upgrade of a module failed
CSCvb95831 Loopback OTV Overlay: OTV ISIS Adj flap on switchover
CSCvb66956 ipv6 mroute oif shows ? instead of interface
CSCvb52410 OTV loopback ASM to BiDir mode change causes Flood traffic loop
CSCvc38109 startup route for SG on reloading module
CSCvc23468 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP November 2016
CSCvc43192 "show tech-support services" unavailable in RISE only VDC
CSCvc32767 xbar_client process restart and switchover results in sup to lc traffic drop
CSCvc25599 F3: port_client Crash
CSCvc49851 MST instance configurations delayd to get synced or failed
CSCvc29233 validate-xml of sh ipv6 snoop policy and counters fail with some special
sub-options set
CSCvc28523 Configuration update aborted with invalid ip address configured
CSCvc42685 M3-F3 SGT (CMD Tag) Exemption For L2 Control Protocol
Identifier Description
CSCuw40711 Nexus - in.dcos-telnetd service crash
CSCuw86555 ENH - N7K Silent/Unknown supervisor switchover
CSCux87740 N7K uses wrong MAC address for BFD when peer switches mac address
Identifier Description
CSCva20758 ISSU - TSH Gdb to upg Gdb Lead to SNMP Crash on MDS 9513
CSCvc69075 MAC address mismatch between SUP and LC after a VPLS failover.
CSCve01811 vpc-config-sync fails with error message
CSCve78301 N7k-PI: bps rate is incorrect under type qos policy-map
CSCve80468 N7K/F2e/F3:Post Routed L3 MCast traffic forwarded on both the FTAG
CSCvf27235 N7K: Improve Logging for Interrupt Fault
CLP_LBD_INT_MEM_ECC_PORT_MAP_TBL_ECC_1ERR
CSCvf36683 N7K-SUP2/E: eUSB Flash Failure or Unable to Save Configuration
CSCvf58207 vPC+ Secondary does not suspend SVIs when Primary reachable via
Fabricpath
CSCvf59067 N7k-8.X- Eigrp SIA due to a query/update from non successor.
CSCvf66024 PBR programming wrong adj index when N7K up with multiple PBR
configured ports
CSCvf75002 Don’t refresh type-5 LSA for which route is not present in RIB
CSCvf77200 n7k/l2vpn: FLUSH not requested upon DOWN->UP change
CSCvf79160 OSPF type-5 routes blocked from RIB when table-map with permit route-map
is applied
CSCvf87011 M3 - Ncpinfraclnt Crash
CSCvg03991 M3 linecard is parsing the Mobile IPv6 header incorrectly and assigning a
drop interface index
CSCvg04072 Cisco NX-OS System Software Patch Installation Command Injection
Vulnerability
CSCvg04455 N7K - RewriteEngineLoopback test failure does not error disable ports in
non-default VDC
CSCvg10842 Input discards after issu to 7.3 or 8.x code, egress throughput reduction for
F3-100gig/40gig ports.
CSCvg11502 Entering encapsulation mpls sub-menu and then exit in n7700 makes
pseudowire to go down
CSCvg17452 Nexus 7k router drops packets at VXLAN encap due to incorrect egress LIF
programming
CSCvg23522 Unable to remove the ACL from N7k
CSCvg24686 SNMP v3 information leaking vulnerability
CSCvg25737 URIB sends route notifications for broadcast routes when the client requests
all-igp notifications
CSCvg27491 F3 module goes HW faulty when using 1Gb Transceiver
CSCvg32741 HA policy URIB crash@urib_ext_comm_on_rte_nib on 8.2.1 release
CSCvg34717 Multicast CP packets are dropped by F2/F3 module
CSCvg44947 Dropping GTP ipv6 packet
CSCvg45324 Static mac programmed as dynamic for orphan mac
Identifier Description
CSCvg46045 post ISSU from 7.2.2 to 7.3.2.D1.2, on collector, the flow record templates
show junk values
CSCvg50660 Need Syslog when DHCP SAP has high MTS Queue Size
CSCvg61970 Tacacs Daemon process crashes due to AAA timeouts
CSCvg67835 IPSLA:sla responder memused reaching memlimit - memory not deallocated
CSCvg68573 N7K/F2 - EG recovery improvements
CSCvg70469 Drop MTS messages when DHCP SAP MTS Queue full.
CSCvg70868 Nexus 7k Sees "ipfib" Crash on N77-F348XP-23 Linecard
CSCvg92062 Post ISSU from 7.3.1 to 8.1.2 image, record templates show junk values
CSCvh02948 After VDC reloaded native vlan mapping to VNI mismatch cause traffic
disruptive
CSCvh04206 Nexus 7000/7700 | 8.2(1) | Unicast broken with wccp enabled
CSCvh05330 M3-Fex: VSH crash on M3 module Tech support
CSCvh23286 cmd_exec_error when executing show tech eigrp through python interpreter
CSCvh30932 IP access list corruption after NX-OS upgrade
CSCvh32898 VRF leaking in SDA: EVPN paths' parent ECMP doesn't update on RIT moves
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases
CSCvh65347 LDI collision seen after sup switchover
CSCvh69235 N77 VRF stuck in 'Delete Holddown' after being deleted
CSCvh87165 Don’t set mpls-vpn flag in URIB for ipv4 LU to VRF leak
CSCvh87462 M3: Mipv6 packet dropping
CSCvh87828 lisp punt route nexthop not deleted/updated for all interfaces/routes after BGP
nexthop change
CSCvi10829 var/tmp 100% full on M3 linecards due to mfib_log.txt
CSCvi11059 F2 linecard goes into a booting loop when more than 200 "vpc orphan-port
suspend" are configured.
CSCvi12277 FEX power supply, fan not populated in entPhysicalTable on N7k for version
8.2(1)
CSCvi34997 N7K - XML sub agent initialization fails: xml session creation failed. Out of
memory.
CSCuz92063 Two paths created from BGP peer even w/o add-path cap exchanged + bgp
cores @ bgp_brib_destroy_path.
CSCvh89092 N7K - adding kernel nvram-messages to show tech.
CSCvg38672 vpc self-isolation: vpc legs are up on local after all modules up when MCT
down.
Identifier Description
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases.
CSCvh14951 IPv6 traffic flow blocked.
CSCvi23370 HSRP VIP resolved on stand-by is missing after SSO.
CSCvi28057 812a DCNM Failure: POAP Script execution failed.
Identifier Description
CSCuw40711 Nexus - in.dcos-telnetd service crash
CSCuw86555 ENH - N7K Silent/Unknown supervisor switchover
CSCvb74706 N7K: F3 2s convergence time on module OIR
CSCvb86787 Cisco Nexus 5K/6K/7K/9K/9500-R/MDS CLI Command Injection
Vulnerability
CSCvb93995 Cisco NX-OS Software removes ACL from VTY interface
CSCvc44015 address-family ipv4 multicast path invalid in BGP but present in URIB
CSCvc56655 Nexus 7k itd NAT destination issue
CSCvc69555 Evaluation of N3K/N3500/N5K/N7K/N9K/MDS for OpenSSH vulnerability
CVE-2016-10010
CSCvc71792 implement a knob to allow weak ciphers
CSCvd10140 Dynamic Mac address has wrong DI (Destination index) on M2
CSCvd72172 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP March 2017
CSCvd74225 N7K/F3: Constant EOBC heartbeat failure
CSCve01811 vpc-config-sync fails with error message
CSCve06320 Netflow - netflow/nfm not responding msg stuck in MTS Buffer
CSCve07101 N7k/6.2(16) BGP not prepending as-path for certain prefixes in a prefix-list
CSCve12380 CTS commands unavailable if medium p2p configured on a port channel
CSCve34578 Nexus 7000: cts hap reset on 7.3(1)D1(1) triggered when ASA failover
happens
CSCve40271 N7K crashes while opening startup-config
CSCve46211 ethpcm crash when trying to allocate memory
CSCve47401 N3K/N9K/N7K OSPF Rogue LSA with maximum sequence number
vulnerability
CSCve51700 Cisco FX-OS and NX-OS System Software CLI Command Injection
Vulnerability
Identifier Description
CSCve54480 ARP ACL not working on M3 card
CSCve54860 im_get_ifindex failure when creating some port-channel subinterfaces
CSCve61829 Unable to access startup config though copy run start succeeds
CSCve65582 config session pushing acls is causing fsm timeout and
CSCve66517 Memleak in URIB_SHMEM_TLV_PTR (show routing ip unicast internal
mem-stats shared detail)
CSCve70348 MHBFD:HSRP vMAC being used by standby once during priority change so
MH BFD sessions are flapping
CSCve78301 N7k-PI: bps rate is incorrect under type qos policy-map
CSCve78734 FHRP hello packet does not TX L3 interface
CSCve80218 ULIB process corrupted, producing route leakage between VRFs
CSCve87784 BGP Process Crash when receivng AS Path longer than 255
CSCve93651 Broken VRF Due to RD Change in BGP
CSCve99902 Cisco Nexus Series Switches CLI Command Injection Vulnerability
CSCve99925 Cisco NX-OS System Software CLI Command Injection Vulnerability
CSCvf18050 FEX: routed sub-interface stop forwarding post fex-fabric uplink reload
CSCvf29432 Cisco Nexus 7000 Series Switches Privilege Escalation via sudo
CSCvf31132 Cisco NX-OS System Software Management Interface Denial of Service
Vulnerability
CSCvf33147 F3 - xbar sync failed during module bringup after upgrade N77-F312CF-26
ver 1.1
CSCvf58207 vPC+ Secondary does not suspend SVIs when Primary reachable via
Fabricpath
CSCvf66000 static ARP might point to wrong physical interface
CSCvf66024 PBR programming wrong adj index when N7K up with multiple PBR
configured ports
CSCvf73007 Access list is failing for SNMPv3 in N7k
CSCvf77200 n7k/l2vpn: FLUSH not requested upon DOWN->UP change
CSCvf77327 ARP Performance Improvement when ARP suppression is enabled
CSCvf87011 M3 - Ncpinfraclnt Crash
CSCvg04072 Cisco NX-OS System Software Patch Installation Command Injection
Vulnerability
CSCvg04455 N7K - RewriteEngineLoopback test failure does not error disable ports in
non-default VDC
CSCvg10842 Input discards after issu to 7.3 or 8.x code, egress throughput reduction for
F3-100gig/40gig ports.
CSCvg11502 Entering encapsulation mpls sub-menu and then exit in n7700 makes
pseudowire to go down
Identifier Description
CSCvg17452 Nexus 7k GOLF router drops packets at VXLAN encap due to incorrect egress
LIF programming
CSCvg24686 SNMP v3 information leaking vulnerability
CSCvg27491 F3 module goes HW faulty when using 1Gb Transceiver
CSCvg34717 Multicast CP packets are dropped by F2/F3 module
CSCvg44947 Dropping GTP ipv6 packet
CSCvg45324 Static mac programmed as dynamic for orphan mac
CSCvg46045 Post ISSU from 7.2.2 to 7.3.2.D1.2, on collector, the flow record templates
show junk values
CSCvg50660 Need Syslog when DHCP SAP has high MTS Queue Size
CSCvf36683 N7K-SUP2/E: eUSB Flash Failure or Unable to Save Configuration
Identifier Description
CSCvg10045 Vxlan fnL UI - ipfib core during ISSU from 8.1.1 to 8.2.1
CSCvf94693 8.2.1:- memory leak for ARP process
CSCvf81424 sh ip arp statistics | validate-xml shows "The output is invalid"
CSCvf83621 show ip arp suppression-cache <summary> | <statistics> shows "output is
valid"
CSCvf51507 BFD neighborship does not come up with OTV site-vlan as bd
CSCvf35516 BFD session doesn't come up if the interface is configured with RACL in
flexible bank chaining mode
CSCvf55349 m2 flexible bank chaining configs/feature is not getting removed while
moving from 8.2.1 to 8.1.1
CSCvf17859 MKA interfaces may error disable on module reload with more than 48 P2P
sessions
CSCvf85857 Bridge-domain L2vpn vfi context not deleting after no bridge-domain <id>
CSCvf00967 MTU on int pseudowire configured, but not effective
CSCve90065 system switchover and LC reload, Xconnect session not come up
CSCvf77032 Few SH BFD sessions are flapping on ISSU with MH + SH BFD (echo
disabled)
CSCvf42053 F3 Phy vPCs - Post fabric port-channel flap, it takes 3 mins for multicast traffic
to converge
CSCvf85636 show ip igmp some option throwing an error for validate-xml option
CSCva19035 "match ipv6 multicast group-range" option not working
CSCvf66675 %PIM6-3-RWSEM_LOCK_FAIL traceback seen after VDC reload
Identifier Description
CSCvf92758 8.2.1 S9 - Xml validation is failing for "show ip pim rp" cmd
CSCvf85600 cmd_path_get: invalid attribute index 1 component 119 for "show ip pim route
| validate-xml"
CSCvf15194 ip pim state limit doesn't take effect with vrf leak
CSCvf16704 LHR takes 9 min to get converged with 2000 routes on 10 vrf
CSCvf85662 show ip mroute detail is throwing an error for validate-xml
CSCvg08603 show ip static-route multicast output not xmlised
CSCvf04475 N77/MVPN: 3 minutes mcast duplication upon PE-P link flap
CSCvf04251 N77/MVPN: unexpected mcast duplication upon reloading and restoring P
router
CSCvf86088 validate-xml fails for "sh otv isis route"
CSCve84229 MKPDU is detected as "Unknown type" in ethanalyzer
CSCvf62523 Routes are stuck in RIB cleanup process due RD is down for some VRF's
CSCvf84063 lisp core on duplicate detection of multiple hosts
CSCve07881 configure replace Fails when trying to do no interface overlay 1000.
CSCvf92504 CR: IPSLA probes modification fails with DEL DB contents and with syntax
error for vrf context
CSCux36446 SSTE: Vinci/Leaf: DAEMON-2-SYSTEM_MSG: fatal: login_init_entry
CSCvf80232 QSA (40G to 10G): Link comes up after multiple flaps on OIR of SFP
CSCvf85238 QSA optic: Link is up in remote side while Link is in not connected state in
local
CSCve62904 CR failed with ERROR: 1 or more interfaces are from a module of type not
supported by this vdc
CSCvg10842 Input discards after ISSU to Cisco NXOS 7.3 or 8.x release, egress throughput
reduction for F3-100gig/40gig ports.
Identifier Description
CSCvb17981 CTS CoA ACK not sent via ip radius source-interface
CSCvc55250 RADIUS CoA ACK sent with incorrect authenticator
CSCvc46038 After Adjmgr stateful restart messages held
CSCur64880 bfd session flap after enabling BFD echo-interface on Loopback1 int
CSCvd85372 MHBFD: All MH BFD sessions flap once on rehosting via LC reload
CSCve12380 CTS commands unavailable if medium p2p configured on a port channel
Identifier Description
CSCvd08898 Hash-algorithm HMAC-SHA-1 can't be configured on F3 linecards, after
upgrading to 7.3.x
CSCvd48792 Processes should clear /var/tmp logs periodically
CSCvd51905 M3-M2 RFC2544 72 L2U port full-mesh throughput test - frame loss
CSCvd56803 M3-M2 10G Performance Issue with 256 Frame Size
CSCvd25258 Bogus DHCP GIADDR being used for DHCP Smart Relay post ISSU
CSCuy29923 Event manager configuration is out of order in start-up configuration
CSCvb28656 Puts sends output to syslog, not the controlling terminal
CSCvd38589 Empty field is seen and Mac's are not secured in Avalon image
CSCvd58766 N7k:Monitor port has VLAN membership although no config present
CSCvc78278 NXOS/ETHPM: Traffic not forwarded after port change from Channeling to
Individual
CSCvd29188 Eb drop counter is showing stats doubled the real eb drops
CSCvd16811 M3 IntLoopback is not running on link down and XCVR not inserted ports
CSCvd53833 N7K: "IFTMC PD commit db search failed" error msg post ISSU to 7.2
CSCvd16210 Incorrect output structure for commands related to per vrf configuration.
CSCvc69075 MAC address mismatch between SUP and LC after a VPLS failover.
CSCvb64844 N7k/vPC+ - L2 loop cause FP core Port not copy CE MAC address
CSCvd40018 BFD packets leaving LC CPU have a vlan id of 0 when egress lookup on
flanker
CSCvd70168 N77/MVPN: Mcast duplication upon clear ip route * on PE node
CSCvc62084 STP BA Inconsistent on port-channel interface when native vlan does not exist
CSCvc67913 Error: AAA authorization failed for command:show version,
AAA_AUTHOR_STATUS_METHOD=16(0x10)
CSCvc42886 No SSH possible to device when root directory is full due to nxapi request
CSCvb84735 NTP sync issue with ntp distribute upon image upgrade due to incorrect vrf id
CSCvc90796 Sync with NTP servers lost intermittently
CSCvd88316 Return value is incorrect for object-tracking configuration - VTS config push
will fail
CSCvc65466 OTV fails to advertise mac after a mac move
CSCvc95126 High CPU caused by VSH after show tech-support issued
CSCvc04030 Setting terminal password breaks sftp/scp transfer operation on N7K
CSCvd37212 M3 vPC Scale: VSH cored after add/remove "feature vpc" and its related
configurations
CSCvd17129 RBH mis programmed after removing interfaces from vpc and reusing the
interface as standalone port
CSCvb93865 Nexus77: routing failover time increased 1sec after version up from 6.2(14) to
7.3(1)D1(1)
Identifier Description
CSCvb10344 ISSU add "port-channel load-balance src-dst ip type invalid fex all" cfg
CSCvc32466 Autoconfig for DCI: VRF stuck on box after reload and add/remove triggers
CSCvc46743 N7k: Traffic from pvlan hosts blackholed when pinging primary SVI
CSCvc54555 F3: DTAG TTL 1 packets have to be rate-limited
CSCvc09777 %SYSMGR-2-VOLATILE_DB_FULL: System volatile database usage is
unexpectedly high at 81%.
CSCvd86332 EIGRP routers stopped propagating default route.
CSCvd04835 Old connected route is not removed from EIGRP topology table
CSCvc81179 Nexus7k ISIS crash at txlist_tq_remove_node
CSCvc51500 LISP hand off on Nexus7K does not work in NX-OS 7.3
CSCve20025 LISP crash during vdc reload
CSCvc91548 Incorrect forwarding address is set to OSPF type-5 LSA of summarized route
CSCvc30847 OSPF LSA not withdrawn from Nexus when interface is down
CSCvd08029 SNMPD crash when RIPv2 authentication is enabled and
RIPv2-MIB::rip2IfConfAuthType is being polled
CSCvc56655 Nexus 7k itd NAT destination issue
CSCvd78869 N7K10G: SMARTC crashed when ISSU from 7.3.0 to 8.1.1
CSCvb32808 statsprofiler crash with no space in sap STATSPROFILER SAP
CSCvd19647 FEX HIF VPC has STP port-type edge and bpduguard disabled on VPC
secondary
CSCvb48317 N7K: Some static routes set BFD remain after disabled I/O module though
BFD states have been down.
CSCvd40091 F3 FEX Scale: SNMP MIB WALK errored out "Reason: resourceUnavailable"
CSCvb65414 logging server vrf goes unknown after switchover
CSCvc57098 Syslog MTS recv_q buffer filling up when "logging source-interface"
configured
CSCvd23076 TACACS crashes when buffer limit (>2072) is crossed for valid command
arguments
CSCvd64752 Nexus Switch Booting In Fabricpath Mode Transit Needs To Send Notification
CSCvc46028 On N7k UDLD does not work interface is configured as promiscuous.
CSCvd74634 UFDM does not download route to line card after ISSU SMU
CSCvd77099 Load sharing is not happening for OTV UDP encap traffic on F3 or M3 cards
CSCvc49851 MST instance configurations delayd to get synced or failed
CSCvb93352 N7K - Loops VTP v3 update on peer-link between vPC peers
CSCvc55528 WCCP crashed due to memory leak - WCCP_MEM_msg_control_packet
CSCvb46891 N7K CoPP: Require stats per forwarding engine for all module types
CSCvd44475 Multicast traffic loss during FP switch id change
CSCvd17080 Need to sym-link /usr/bin/python to /isan/bin/python
Identifier Description
CSCvb86602 % Next-hop cannot be local address in same or different vrf
CSCvg10842 Input discards after ISSU to Cisco NXOS 7.3 or 8.x release, egress throughput
reduction for F3-100gig/40gig ports.
Identifier Description
CSCus83776 ITD: Can't advertise the route for VIP
CSCva11756 vPC+: Wrong ESDB info due to changing port-channels having VPC's
CSCva13788 post ISSU, bfdc crashed due session data structure corruption
CSCuz75979 N7k interface counters are not being updated.
CSCvb12189 SNMP Timeout Requesting lldpRemManAddrOID on Certain Interfaces
CSCvb30818 IGMP Snooping Mrouter port state is not synced during bootup in VPC
CSCvb61043 vPC Auto-recovery doesnt kick-in after reload with keep-alive down
CSCuz53597 N7K does not advertise implicit-null label as an Edge-LSR should do
CSCvb31890 Tracebacks on MPLS TE
CSCuy62745 Master Bug to port fix for 2348 Issues from N5k to N7k,N9k
CSCuy14606 enhance system internal mem for sysmgr @ LC level
CSCuu15632 Invalid PI error, configuring static nat without carving Tcam for NAT
CSCuy04933 Wrong timestamps in netflow data
CSCva81638 N7K Netflow F3/M3: Rate limiter default value incorrectly programmed
CSCvb17413 Unable to access NXAPI Sandbox(Non-default VDC) as VDC-Admin
CSCuz44147 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP April 2016 CVEs
CSCux95101 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP January 2016 CVEs
CSCuz92661 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP June 2016 CVEs
CSCuw84708 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP October 2015 CVEs
CSCvb02494 N7K OTV with BFD configured / BFD Session Flaps on System Switchover
CSCuh22289 N7k Enh: "terminal log-all" functionality should be default
CSCva25803 NX-OS route-map fails to parse v4-mapped IPv6 address
CSCuz98928 NX-OS: pipe not recognized as special character by 'exclude' cli filter
CSCvb31113 N7K PTP Process crash with NULL pointer mts_wrap_p
CSCva61554 aclqos crash due to port configuration default dscp one-to-one mapping
CSCvb49085 n7k M3: Shaping policy causes interfaces to go to suspended state and
IntPortloopback to fail
CSCux77223 bestpath run in vrf - route gets deleted
CSCvb44776 BGP crashes due heartbeat failure after asserts
CSCvb14569 frequent no rd and rd config can get vrf stuck in down state
CSCva79760 IPV6 link local only BGP peering leads to installing wrong adjcaency
CSCuu06829 SUP switchover causes duplicate connection on switchover device
CSCuy07502 In show running, ffff is missing from the v4 mapped v6 address.
CSCuu78729 EIGRP can install non-successor to RIB in case of ECMP paths
CSCvb99376 N7K send Candidate Default bit in the EIGRP update
CSCva83066 Eigrp loop, route not flushed from topology table
CSCuy77045 configuring "mpls ldp sync" removes "mpls traffic-eng router-id" command
CSCuz67595 Incorect IGP metric calculation for ISIS
Identifier Description
CSCuy99477 Change metrictype of redistributed routes from MPBGP-OSPF from E2 to E1
CSCuv66399 Forwarding address not set in OSPF for routes w/ different prefix length
CSCux69728 LSA stuck in DB
CSCuw03410 Nexus 6.2.x OSPF taking long time in LSA generation
CSCvb16035 NxOS ABR in OSPF totally stubby area does not originate default LSA
CSCuz18971 old/inactive area-ids are not cleared from the ospf db
CSCut11150 OSPF max-metric doesn't work when startup timer value is default
CSCuv81861 OSPF NSSA sending type 7 LSA after converted to regular area
CSCuw27044 OSPFv3 takes 30 min to install route when using link-local addresses
CSCvb06742 OTV SAP ignores MTS high water mark warnings
CSCuy89746 OTV VDC crashes after remote command "reload ascii"
CSCuz51928 icmpv6 crashes because of access to a non-readable memory region.
CSCva11364 ARP hap rest
CSCux63096 CSCuw89606 and CSCut84448
CSCuq72316 N7K:Static route leak w/ unconfig/config SVIs cause traffic black hole
CSCuz55002 BGP table with no nexthop when nexthop learnt thro LU
CSCuu35152 URIB service crash on N7K running 5.2(9)
CSCut46704 vman service may crash unexpectedly
CSCvb48568 Evaluation of N9k/N7k/N5k/N3k/MDS for OpenSSL September 2016 CVEs
CSCuy78340 IP SLA udp jitter v2 time out when no timestamp from netstack
CSCuz46882 rttMonEchoAdminTargetAddress not responding if part of address is zero
CSCuy19010 SNMPd causes boot loop after reload with unload-MIB configuration
CSCuw76278 NX-OS - Netstack panic crash due to buffer lockup
CSCva60566 conflicting features not prevented with bank mapping enabled
CSCuv70053 Mode access interface on AA FEX inactive after reload vPC primary
CSCus61633 N7000 ACLs are not case sensitive
CSCvb76929 N7k: ACL's are not programmed into tcam
CSCvb71127 N7K LC fail to boot up due to "LC insertion sequence failure"
CSCuz91706 Username limited to 28 characters causes issue for vmtracker feature
CSCvb04007 FEX A/A: Convergence takes 5-6 secs on FPC secondary "no shut"
CSCvb79120 N7k/2348UPQ: packet incorrectly forwarded out of HIF ports on port flap
CSCva90035 VRRP VIP not Programmed
CSCva72823 VTP type-2 configuration incompatible on VTPV2_VPC Regression
Related Documentation
Cisco Nexus 7000 documentation is available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/tsd-products-support-series
-home.html
The Release Notes for upgrading the FPGA/EPLD is available at the following URL:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/7_x/epld/epld_rn_72.html
Cisco NX-OS documents include the following:
Cisco Nexus 7000 series configuration guides are available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-installation-and-c
onfiguration-guides-list.html
Cisco Nexus 7000 series command references are available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-command-referen
ce-list.html