0% found this document useful (0 votes)
969 views

Nexus 7k

Nexus 7k basics

Uploaded by

CCNA class
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
969 views

Nexus 7k

Nexus 7k basics

Uploaded by

CCNA class
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 84

Cisco Nexus 7000 Series NX-OS 8.

x, Release
Notes

First Published: December 22, 2016


Last Modified: June 11, 2018
Current Release: 8.2(2)

This document describes the features, caveats, and limitations for Cisco NX-OS software for use on the
Cisco Nexus 7000 Series Switches. Use this document in combination with documents listed in Related
Documentation, page 84.

Note Release notes are sometimes updated with new information about restrictions and caveats. See the
following website for the most recent version of the Cisco Nexus 7000 Series NX-OS Release Notes:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-release-notes-list.html

Table 1 shows the online change history for this document.


Table 1 Change History

Date Description
June 11, 2018 Updated the Supported Upgrade and Downgrade Paths, page 36 section to
include Cisco NX-OS Release 7.3(2)D1(3).
April 12, 2018 Created release notes for Cisco NX-OS Release 8.2(2).
March 7, 2018 Created release notes for Cisco NX-OS Release 8.1(2a).
January 30, 2018 Created release notes for Cisco NX-OS Release 8.1(2).
September 28, 2017 Created release notes for Cisco NX-OS Release 8.2(1).
June 30, 2017 Updated the Non-ISSU Upgrade/Cold Boot Upgrade, page 43 section to include
Cisco NX-OS Release 7.3(2)D1(1).
May 3 2017 Created release notes for Cisco NX-OS Release 8.1(1).
February 21, 2017 Updated the Upgrade and Downgrade Paths and Caveats, page 36 section to
include Cisco NX-OS Release 6.2(18).
December 22, 2016 Created release notes for Cisco NX-OS Release 8.0(1).

Cisco Systems, Inc.


www.cisco.com
Contents

Contents
This document includes the following sections:
• Introduction, page 2
• System Requirements, page 2
• Guidelines and Limitations, page 28
• Upgrade and Downgrade Paths and Caveats, page 36
• Erasable Programmable Logic Device Images, page 51
• New Hardware, page 54
• New and Enhanced Software Features, page 55
• MIBs, page 68
• Licensing, page 68
• Caveats, page 68
• Related Documentation, page 84
• Obtaining Documentation and Submitting a Service Request, page 84

Introduction
The Cisco NX-OS software for the Cisco Nexus 7000 Series fulfills the routing, switching, and storage
networking requirements of data centers and provides an Extensible Markup Language (XML) interface
and a command-line interface (CLI) similar to Cisco IOS software.

System Requirements
This section includes the following topic:
• Supported Device Hardware, page 2

Supported Device Hardware


The Cisco NX-OS software supports the Cisco Nexus 7000 Series that includes Cisco Nexus 7000
switches and Cisco Nexus 7700 switches. You can find detailed information about supported hardware
in the Cisco Nexus 7000 Series Hardware Installation and Reference Guide.

Note Cisco Nexus 7000 Supervisor 1 modules, M1 series modules (XL and non-XL modes), FAB-1 modules,
F2 series modules are not supported in Cisco NX-OS Release 8.x.

Table 2 shows the Cisco Nexus 7000 Series Switch and Cisco Nexus 7700 Switch hardware support
details.
Table 3 shows the Fabric Extender (FEX) modules supported by the Cisco Nexus 7000 and Cisco Nexus
7700 I/O modules.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


2
System Requirements

Table 4 shows the transceiver devices supported in each release of Cisco Nexus 7000 Series.
For a list of minimum recommended Cisco NX-OS software releases for use with Cisco Nexus 7000
Series switches, see the document titled Minimum Recommended Cisco NX-OS Releases for Cisco Nexus
7000 Series Switches.
Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support

Product ID Hardware Minimum Software Release


Cisco Nexus 7000 Series Hardware
N7K-AC-3KW 3.0-kW AC power supply unit 6.1(2)
N7K-AC-6.0KW 6.0-kW AC power supply unit 4.0(1)
N7K-AC-7.5KW-INT 7.5-kW AC power supply unit 4.1(2)
N7K-AC-7.5KW-US 4.1(2)
N7K-C7004 Cisco Nexus 7004 chassis 6.1(2)
N7K-C7004-FAN Replacement fan for the Cisco 6.1(2)
Nexus 7004 chassis
N7K-C7009 Cisco Nexus 7009 chassis 5.2(1)
N7K-C7009-FAB-2 Fabric module, Cisco Nexus 5.2(1)
7000 Series 9-slot
N7K-C7009-FAN Replacement fan for the Cisco 5.2(1)
Nexus 7009 chassis
N7K-C7010 Cisco Nexus 7010 chassis 4.0(1)
N7K-C7010-FAB-2 Fabric module, Cisco Nexus 6.0(1)
7000 Series 10-slot
N7K-C7010-FAN-F Fabric fan tray for the Cisco 4.0(1)
Nexus 7010 chassis
N7K-C7010-FAN-S System fan tray for the Cisco 4.0(1)
Nexus 7010 chassis
N7K-C7018 Cisco Nexus 7018 chassis 4.1(2)
N7K-C7018-FAB-2 Fabric module, Cisco Nexus 6.0(1)
7000 Series 18-slot
N7K-C7018-FAN Fan tray for the Cisco Nexus 4.1(2)
7018 chassis
N7K-DC-3KW 3.0-kW DC power supply unit 6.1(2)
N7K-DC-6.0KW 6.0-kW DC power supply unit 5.0(2)
N7K-DC-PIU (cable included) 5.0(2)
N7K-DC-CAB= DC power interface unit 5.0(2)
DC 48 V, -48 V cable (spare)
N7K-F248XP-25E Enhanced 48-port 1/10 Gigabit 6.1(2)
Ethernet SFP+ I/O module (F2E
Series)
N7K-F248XT-25E Enhanced 48-port 1/10 6.1(2)
GBASE-T RJ45 module (F2E
Series)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


3
System Requirements

Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support

Product ID Hardware Minimum Software Release


N7K-F306CK-25 Cisco Nexus 7000 6-port 6.2(10)
100-Gigabit Ethernet CPAK I/O
module (F3 Series)
N7k-F312FQ-25 Cisco Nexus 7000 12-port 6.2(6)
40-Gigabit Ethernet QSFP+ I/O
module (F3 Series)
N7K-F348XP-25 Cisco Nexus 7000 48-port 6.2(12)
1/10-Gigabit Ethernet SFP+ I/O
module (F3 Series)
N7K-HV-3.5KW 3.5KW High Voltage Power 7.3(0)D1(1)
Supply Unit
N7K-M202CF-22L 2-port 100-Gigabit Ethernet I/O 6.1(1)
module XL (M2 Series)
N7K-M206FQ-23L 6-port 40-Gigabit Ethernet I/O 6.1(1)
module XL (M2 Series)
N7K-M224XP-23L 24-port 10-Gigabit Ethernet I/O 6.1(1)
module XL (M2 Series)
N7K-M324FQ-25L Cisco Nexus 7000 M3 Series 8.0(1)
24-Port 40-Gigabit Ethernet I/O
Module
N7K-M348XP-25L Cisco Nexus 7000 M3 Series 8.0(1)
48-Port 1/10-Gigabit Ethernet
I/O Module
N7K-SUP2 Supervisor 2 module 6.1(1)
N7K-SUP2E Supervisor 2 Enhanced module 6.1(1)
Cisco Nexus 7700 Series Hardware
N77-AC-3KW Cisco Nexus 7700 AC power 6.2(2)
supply
N77-C7702 Cisco Nexus 7702 chassis 7.2(0)D1(1)
N77-C7702-FAN Fan, Cisco Nexus 7702 chassis 7.2(0)D1(1)
N77-C7706 Cisco Nexus 7706 chassis 6.2(6)
N77-C7706-FAB-2 Fabric Module, Cisco Nexus 6.2(6)
7706 chassis
N77-C7706-FAN Fan, Cisco Nexus 7706 chassis 6.2(6)
N77-C7706-FAN-2 Generation 2 Fan Tray, Cisco 8.1(1)
Nexus 7706 Chassis
N77-C7710 Cisco Nexus 7710 chassis 6.2(2)
N77-C7710-FAB-2 Fabric Module, Cisco Nexus 6.2(2)
7710 chassis
N77-C7710-FAN Fan, Cisco Nexus 7710 chassis 6.2(2)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


4
System Requirements

Table 2 Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Switches Hardware Support

Product ID Hardware Minimum Software Release


N77-C7710-FAN-2 Fan, Cisco Nexus 7710 chassis 8.1(1)
N77-C7718 Cisco Nexus 7718 chassis 6.2(2)
N77-C7718-FAB-2 Fabric Module, Cisco Nexus 6.2(2)
7718 chassis
N77-C7718-FAN Fan, Cisco Nexus 7718 chassis 6.2(2)
N77-C7718-FAN-2 Fan, Cisco Nexus 7718 chassis 8.1(1)
N77-DC-3KW Cisco Nexus 7700 DC power 6.2(2)
supply
N77-F248XP-23E Cisco Nexus 7700 Enhanced 6.2(2)
48-port 1/10 Gigabit Ethernet
SFP+ I/O module (F2E Series)
N77-F324FQ-25 Cisco Nexus 7700 24-port 6.2(6)
40-Gigabit Ethernet QSFP+ I/O
module (F3 Series)
N77-F348XP-23 Cisco Nexus 7700 48-port 6.2(6)
1/10-Gigabit Ethernet SFP+ I/O
module (F3 Series)
N77-HV-3.5KW 3.5KW High Voltage Power 7.3(0)D1(1)
Supply Unit
N77-M312CQ-26L 12-Port 100-Gigabit Ethernet 8.0(1)
(M3 Series)
N77-M348XP-23L 48-port 1/10-Gigabit Ethernet 7.3(0)DX(1)
SFP+ I/O module (M3 series)
N77-M324FQ-25L 24-port 40-Gigabit Ethernet 7.3(0)DX(1)
QSFP+ I/O module (M3 series)
N77-SUP2E Cisco Nexus 7700 Supervisor 2 6.2(2)
Enhanced module

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
FEX Modules Supported by Cisco Nexus 7000 Series Modules

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


5
System Requirements

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
48-port 1-/10-Gigabit Ethernet SFP+ I/O N2K-C2232PP 8.1(1)
M3 Series module (N7K-M348XP-25L)
N2K-C2224TP
24-port 40-Gigabit Ethernet QSFP+ I/O N2K-C2248TP-E
M3 Series module (N7K-M324FQ-25L)
N2K-C2248PQ
N2K-C2348UPQ
N2K-C2348TQ
N2K-C2332TQ
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
12-port 40-Gigabit Ethernet QSFP I/O N2K-C2224TP-1GE 6.2(12)
F3 Series module (N7k-F312FQ-25)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP1
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
6-port 40-Gigabit Ethernet I/O M2 N2k-2348UPQ 7.2(0)D1(1)
Series module XL (N7K-M206FQ-23L)
N2k-2348TQ
Breakout (4*10G) mode 40-Gigabit N2k-2224TP 7.2(0)D1(1)
Ethernet I/O M2 Series module XL N2k-2232PP
(N7K-M206FQ-23L)
N2k-2232TM
N2k-2232TM-E
N2k-2248PQ
N2k-2248TP
N2k-2248TP-E

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


6
System Requirements

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
24-port 10-Gigabit Ethernet I/O M2 N2K-C2224TP-1GE 6.1(1)
Series module XL (N7K-M224XP-23L)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E 6.2(2)
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
48-port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2224TP-1GE 6.2(12)
F3 Series module (N7K-F348XP-25)
N2K-C2248TP-1GE
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-2232TM-E
N2K-2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


7
System Requirements

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
Enhanced 48-port 1/10 Gigabit Ethernet N2K-C2224TP-1GE 6.1(2)
SFP+ I/O module (F2E Series)
N2K-C2248TP-1GE
(N7K-F248XP-25E)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-2232TM-E 6.2(2)
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
FEX Modules Supported by Cisco Nexus 7700 Series Modules
48-port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2224TP-1GE 6.2(2)
module (F2E Series)
N2K-C2248TP-1GE
(N77-F248XP-23E)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2232TM-E
N2K-C2248PQ
N2K-C2248TP-E
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


8
System Requirements

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
24-port Cisco Nexus 7700 F3 Series N2K-C2224TP-1GE 6.2(8)
40-Gigabit Ethernet QSFP I/O module
N2K-C2248TP-1GE
(N77-F324FQ-25)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP2
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
48-port Cisco Nexus 7700 F3 Series N2K-C2224TP-1GE 6.2(6)
1/10-Gigabit Ethernet SFP+ I/O module N2K-C2248TP-1GE
(N77-F348XP-23)
N2K-C2232PP-10GE
N2K-C2232TM
N2K-C2248TP-E
N2K-C2232TM-E
N2K-C2248PQ
N2K-B22HP
N2K-C2348UPQ 7.2(0)D1(1)
N2K-C2348TQ
N2K-B22IBM
N2K-C2332TQ 8.1(1)
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


9
System Requirements

Table 3 FEX Modules Supported by Cisco Nexus 7000 and 7700 Series Modules (continued)

Cisco Nexus 7000 Series Module FEX Module Minimum Software Release
48-Port 1/10 Gigabit Ethernet SFP+ I/O N2K-C2232PP 8.1(1)
M3 Series module (N77-M348XP-23L)
N2K-C2224TP
N2K-C2248TP-E
24-Port 40 Gigabit Ethernet QSFP+ I/O N2K-C2248PQ
M3 Series module (N77-M324FQ-25L)
N2K-C2348UPQ
N2K-C2348TQ
N2K-C2332TQ
N2k-C2348TQ-E 8.2(1)
N2K-B22DELL-P
1. FEX server-facing interfaces should be configured in autonegotiate mode. Do not force a specific data rate.

Note The Cisco Nexus 7000 Enhanced F2 Series 48-port 1/10 GBASE-T RJ-45 Module (N7K-F248XT-25E)
does not support Cisco Nexus 2000 FEXs.

Note FEX modules does not support M3 series modules in Cisco NX-OS Release 7.3(0)DX(1), Cisco NX-OS
Release 7.3(1)D1, and in Cisco NX-OS Release 8.0(1).

Table 4 Transceivers Supported by Cisco NX-OS Software Releases

Minimum
Software
I/O Module Product ID Transceiver Type Version
N77-F248XP-23E FET-10G Cisco Fabric Extender Transceiver 6.2(2)
(FET)
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(2)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(2)
SFP-10G-LR-S

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


10
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-ER 10GBASE-ER SFP+ 6.2(2)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(2)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(2)
SFP-10G-ZR-S
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(2)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(2)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(2)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(2)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(2)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(2)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(2)
GLC-SX-MM 1000BASE-SX SFP 6.2(2)
GLC-SX-MMD 1000BASE-SX SFP 6.2(2)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T SFP 6.2(2)
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-BX-D 1000BASE-BX10-D 6.2(2)
GLC-BX-U 1000BASE-BX10-U 6.2(2)
GLC-EX-SMD 1000BASE-EX SFP 6.2(2)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.2(2)
DWDM-SFP10G-xx.xx3 10GBASE-DWDM SFP+ 6.2(2)
3
DWDM-SFP-xxxx 1000BASE-DWDM 6.2(2)
4
N77-F312CK-26 CPAK-100G-SR4 Multi-mode fiber (MMF) 7.3(2)D1(1)

CPAK-100G-ER4L Cisco 100GBASE-ER4L CPAK 7.2(1)D1(1)


#
CPAK-100G-LR4 Cisco 100GBASE-LR4 CPAK 6.2(6)
#
CPAK-100G-SR10 Cisco 100GBASE-SR10 CPAK 6.2(6)
N77-F324FQ-25 CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


11
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
CVR-QSFP-SFP10G Cisco 40G QSFP 6.2(14)
(This is supported only on
F3 40G I/O modules with
SFP-10G-SR or
SFP-10G-SR-S optics. If
the F3 I/O module is
reloaded, the ports
containing the
CVR-QSFP-SFP10G
adapter may remain down
even after the F3 I/O
module comes back up. If
so, the CVR-QSFP-SFP10G
adapter must be reseated.)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.2(6)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(6)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.2(6)
QSFP-40G-LR4-S
FET-40G Cisco 40G Fabric Extender 6.2(8)
Transceiver (FET)
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(8)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-4X10G-LR-S Single-mode fiber (SMF) 7.3(1)D1(1)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,5
m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 6.2(10)
QSFP+

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


12
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
N77-F348XP-23 CWDM-SFP-xxxx2 1000BASE-CWDM 6.2(8)
2
DWDM-SFP-xxxx 1000BASE-DWDM 6.2(8)
GLC-TE 1000BASE-T SFP 6.2(10)
FET-10G Cisco Fabric Extender Transceiver 6.2(6)
(FET)
SFP-10G-AOCxM 110GBASE-AOC (Active Optical 6.2(10)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(6)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(6)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.2(6)
SFP-10G-ER-S
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(6)
SFP-10G-ZR-S
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.2(6)
1
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(8)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(8)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(8)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(8)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(8)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(8)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(8)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(8)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(8)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


13
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(8)
GLC-SX-MM 1000BASE-SX SFP 6.2(8)
GLC-SX-MMD 1000BASE-SX SFP 6.2(8)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(8)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(8)
GLC-T 1000BASE-T SFP 6.2(8)
GLC-BX-D 1000BASE-BX10-D 6.2(8)
GLC-BX-U 1000BASE-BX10-U 6.2(8)
GLC-EX-SMD 1000BASE-EX SFP 6.2(8)
FET-10G Cisco Fabric Extender Transceiver 6.2(8)
(FET)
N7K-F306CK-25 CPAK-100G-SR44 Multi-mode fiber (MMF) 7.3(2)D1(1)
CPAK-100G-ER4L Cisco 100GBASE-ER4L CPAK 7.2(1)D1(1)
#
CPAK-100G-LR4 Cisco 100GBASE-LR4 CPAK 6.2(10)
#
CPAK-100G-SR10 Cisco 100GBASE-SR10 CPAK 6.2(10)
N7K-F312FQ-25 CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
CVR-QSFP-SFP10G Cisco 40G QSFP 6.2(14)
(This is supported only on
F3 40G I/O modules with
SFP-10G-SR or
SFP-10G-SR-S optics. If
the F3 I/O module is
reloaded, the ports
containing the
CVR-QSFP-SFP10G
adapter may remain down
even after the F3 I/O
module comes back up. If
so, the CVR-QSFP-SFP10G
adapter must be reseated.)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.2(6)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(6)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.2(6)
QSFP-40G-LR4-S
FET-40G Cisco 40G Fabric Extender 6.2(6)
Transceiver (FET)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


14
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(8)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-4X10G-LR-S Single-mode fiber (SMF) 7.3(1)D1(1)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 6.2(10)
QSFP+
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
2
N7K-F348XP-25 CWDM-SFP-xxxx 1000BASE-CWDM 6.2(12)
DWDM-SFP-xxxx2 1000BASE-DWDM 6.2(12)
GLC-TE 1000BASE-T SFP 6.2(12)
FET-10G Cisco Fabric Extender Transceiver 6.2(12)
(FET)
SFP-10G-AOCxM 110GBASE-AOC (Active Optical 6.2(12)
Cable) SFP+ Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.2(12)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.2(12)
SFP-10G-LR-S

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


15
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-ER 10GBASE-ER SFP+ 6.2(12)
SFP-10G-ER-S
SFP-10G-ZR 10GBASE-ZR SFP+ 6.2(12)
SFP-10G-ZR-S
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.2(12)
1
SFP-10G-LRM 10GBASE-LRM SFP+ 6.2(12)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.2(12)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(12)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.2(12)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.2(12)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.2(12)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.2(12)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.2(12)
GLC-LH-SM 1000BASE-LX/LH SFP 6.2(12)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.2(12)
GLC-SX-MM 1000BASE-SX SFP 6.2(12)
GLC-SX-MMD 1000BASE-SX SFP 6.2(12)
GLC-ZX-SM 1000BASE-ZX SFP 6.2(12)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(12)
GLC-T 1000BASE-T SFP 6.2(12)
GLC-BX-D 1000BASE-BX10-D 6.2(12)
GLC-BX-U 1000BASE-BX10-U 6.2(12)
GLC-EX-SMD 1000BASE-EX SFP 6.2(12)
FET-10G Cisco Fabric Extender Transceiver 6.2(12)
(FET)
N7K-F248XP-25 FET-10G Cisco Fabric Extender Transceiver 6.0(1)
(FET)

SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)


(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


16
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-SR 10GBASE-SR SFP+ 6.0(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.0(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.0(1)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.0(1)
SFP-10G-ZR 2 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.0(1)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.0(1)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.0(1)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.0(1)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.0(1)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.0(1)
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-LH-SM 1000BASE-LX/LH SFP 6.0(1)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.0(1)
GLC-SX-MM 1000BASE-SX SFP 6.0(1)
GLC-SX-MMD 1000BASE-SX SFP 6.0(1)
GLC-ZX-SM 1000BASE-ZX SFP 6.0(1)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T SFP 6.0(1)
GLC-BX-D 1000BASE-BX10-D 6.0(1)
GLC-BX-U 1000BASE-BX10-U 6.0(1)
GLC-EX-SMD 1000BASE-EX SFP 6.1(1)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.0(1)
3
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.1(1)
DWDM-SFP-xxxx 3 1000BASE-DWDM 6.0(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


17
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
N7K-F248XP-25E FET-10G Cisco Fabric Extender Transceiver 6.1(2)
(FET)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 6.1(2)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.1(2)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.1(2)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.1(2)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.1(2)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 6.1(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.1(2)
Cable Active (7 m, 10 m)
SFP-GE-T 1000BASE-T SFP 6.1(2)
SFP-GE-S 1000BASE-SX SFP (DOM) 6.1(2)
SFP-GE-L 1000BASE-LX/LH SFP (DOM) 6.1(2)
SFP-GE-Z 1000BASE-ZX SFP (DOM) 6.1(2)
GLC-LH-SM 1000BASE-LX/LH SFP 6.1(2)
GLC-LH-SMD 1000BASE-LX/LH SFP 6.1(2)
GLC-SX-MM 1000BASE-SX SFP 6.1(2)
GLC-SX-MMD 1000BASE-SX SFP 6.1(2)
GLC-ZX-SM 1000BASE-ZX SFP 6.1(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.1(2)
GLC-T 1000BASE-T SFP 6.1(2)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


18
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-TE 1000BASE-T SFP 6.2(10)
GLC-BX-D 1000BASE-BX10-D 6.1(2)
GLC-BX-U 1000BASE-BX10-U 6.1(2)
GLC-EX-SMD 1000BASE-EX SFP 6.1(2)
2
CWDM-SFP-xxxx 1000BASE-CWDM 6.1(2)
3
DWDM-SFP10G-xx.xx 10GBASE-DWDM SFP+ 6.1(2)
3
DWDM-SFP-xxxx 1000BASE-DWDM 6.1(2)
1
N7K-M108X2-12L SFP-10G-SR 10GBASE-SR SFP+ 5.2(3a)
SFP-10G-SR-S
SFP-10G-LR1 10GBASE-LR SFP+ 5.2(3a)
SFP-10G-LR-S
SFP-10G-LRM1 10GBASE-LRM SFP+ 5.2(1)
1
SFP-H10GB-CUxM SFP-H10GB-CUxM Twinax 5.2(1)
Cable Passive (1 m, 3 m, 5 m)
CVR-X2-SFP10G OneX Converter Module - X2 to 5.2(1)
SFP+ Adapter
X2-10GB-CX4 10GBASE-CX4 X2 5.1(1)
X2-10GB-ZR 10GBASE-ZR X2 5.1(1)
X2-10GB-LX4 10GBASE-LX4 X2 5.1(1)
X2-10GB-SR 10GBASE-SR X2 5.0(2a)
X2-10GB-LR 10GBASE-LRX2 5.0(2a)
X2-10GB-LRM 10GBASE-LRM X2 5.0(2a)
X2-10GB-ER 10GBASE-ERX2 5.0(2a)
3
DWDM-X2-xx.xx= 10GBASE-DWDM X2 5.0(2a)
N7K-M148GS-11L SFP-GE-S 1000BASE-SX 5.0(2a)
GLC-SX-MM 5.0(2a)
SFP-GE-L 1000BASE-LX 5.0(2a)
GLC-LH-SM 5.0(2a)
SFP-GE-Z 1000BASE-ZX 5.0(2a)
GLC-ZX-SM 5.0(2a)
GLC-EX-SMD 1000BASE-EX SFP 6.2(2)
GLC-ZX-SMD 1000BASE-ZX SFP 6.2(2)
GLC-T 1000BASE-T 5.0(2a)
SFP-GE-T 5.0(2a)
GLC-BX-D 1000BASE-BX10-D 5.2(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


19
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
GLC-BX-U 1000BASE-BX10-U 5.2(1)
GLC-SX-MMD 1000BASE-SX 5.2(1)
GLC-LH-SMD 1000BASE-LX 5.2(1)
GLC-TE 1000BASE-T SFP 6.2(10)
3
DWDM-SFP-xxxx 1000BASE-DWDM 5.0(2a)
2
CWDM-SFP-xxxx 1000BASE-CWDM 5.0(2a)
N7K-M132XP-12L FET-10G Cisco Fabric Extender Transceiver 5.1(1)
(FET)
SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
SFP-10G-SR 10GBASE-SR SFP+ 5.1(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 5.1(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 5.1(1)
SFP-10G-ER-S
SFP-10G-LRM 10GBASE-LRM SFP+ 5.1(1)
1
SFP-10G-ZR 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 5.1(1)
Cable Active (7 m, 10 m)
SFP-H10GB-CUxM1 SFP-H10GB-CUxM Twinax 5.1(2)
Cable Passive (1 m, 3 m, 5 m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
DWDM-SFP10G-xx.xx 3 10GBASE-DWDM SFP+ 6.1(1)
N7K-M224XP-23L SFP-10G-BXD-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
downstream

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


20
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-BXU-I 10GBASE-BX Bidirectional 7.2(0)D1(1)
(single fiber) SFP+, 10km reach,
upstream
FET-10G Cisco Fabric Extender Transceiver 6.1(1)
(FET)
SFP-10G-SR 10GBASE-SR SFP+ 6.1(1)
SFP-10G-SR-S
SFP-10G-LR 10GBASE-LR SFP+ 6.1(1)
SFP-10G-LR-S
SFP-10G-ER 10GBASE-ER SFP+ 6.1(1)
SFP-10G-ER-S
SFP-10G-ZR 3 10GBASE-ZR SFP+ 6.1(1)
SFP-10G-ZR-S
SFP-10G-LRM 10GBASE-LRM SFP+ 6.1(1)
SFP-10G-AOCxM 10GBASE-AOC (Active Optical 6.2(2)
Cable) SFP+ Cable
(1 m, 2 m, 3 m, 5 m, 7 m, 10 m)
SFP-H10GB-ACUxM SFP-H10GB-ACUxM Twinax 6.1(1)
Cable Active (7 m, 10 m)
SFP-H10GB-CUxM 1 SFP-H10GB-CUxM Twinax 6.1(1)
Cable Passive (1m, 3m, 5m)
SFP-H10GB-CUxM SFP-H10GC-CUxM Twinax 6.2(2)
Cable Passive (1.5 m, 2 m, 2.5 m)
DWDM-SFP10G-xx.xx 3 10GBASE-DWDM SFP+ 6.1(1)
N77-M312CQ-26L CPAK-100G-SR4 Multi-mode fiber (MMF) 8.1(1)
QSFP-100G-CSR4-S 100G extended short reach 300m 8.2(1)
OM3 400m OM4
QSFP-100G-ER4L-S 100G-ER4 lite SMF (40km) 8.2(1)
QSFP-100G-SM-SR 100G Short Reach over dual SMF 8.2(1)
(2km)
QSFP-100G-SR4-S Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-CSR4
QSFP-40G-SR4
QSFP-40G-SR4-S
QSFP-40G-SR-BD

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


21
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-100G-CWDM4-S Single-mode fiber (SMF) 8.0(1)
QSFP-100G-PSM4-S
QSFP-100G-LR4-S
QSFP-40G-LR4-S
QSFP-40G-ER4
QSFP-40G-LR4
QSFP-H40G-ACU7M Direct attach copper, active 8.0(1)
QSFP-H40G-ACU10M
QSFP-100G-AOC1M Active optical cable assembly 8.0(1)
QSFP-100G-AOC2M
QSFP-100G-AOC3M
QSFP-100G-AOC5M
QSFP-100G-AOC7M
QSFP-100G-AOC10M
QSFP-100G-AOC15M
QSFP-100G-AOC20M
QSFP-100G-AOC25M
QSFP-100G-AOC30M
QSFP-H40G-AOC1M
QSFP-H40G-AOC2M
QSFP-H40G-AOC3M
QSFP-H40G-AOC5M
QSFP-H40G-AOC7M
QSFP-H40G-AOC10M
QSFP-H40G-AOC15M
WSP-Q40G-LR4L 40GBASE-LR4 QSFP40G (for 8.0(1)
Single-mode Fiber (SMF))
N77-M324FQ-25L CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
FET-40G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
QSFP-40G-CSR4 Multi-mode fiber (MMF) 7.3(0)DX(1)
QSFP-40G-SR4
QSFP-40G-SR4-S
QSFP-40G-SR-BD

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


22
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-ER4 Single-mode fiber (SMF) 7.3(0)DX(1)
QSFP-40G-LR4
QSFP-40G-LR4-S
QSFP-4X10G-LR-S
WSP-Q40G-LR4L
QSFP-H40G-ACU7M Direct attach copper, active 7.3(0)DX(1)
QSFP-H40G-ACU10M
QSFP-4X10G-AC7M Direct attach breakout copper, 8.0(1)
QSFP-4X10G-AC10M active

QSFP-H40G-AOC1M Active optical cable assembly 7.3(0)DX(1)


QSFP-H40G-AOC2M
QSFP-H40G-AOC3M
QSFP-H40G-AOC5M
QSFP-H40G-AOC7M
QSFP-H40G-AOC10M
QSFP-H40G-AOC15M
QSFP-4X10G-AOC1M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC2M
QSFP-4X10G-AOC3M
QSFP-4X10G-AOC5M
QSFP-4X10G-AOC7M
QSFP-4X10G-AOC10M
N77-M348XP-23L FET-10G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
GLC-TE Category 5 7.3(0)DX(1)
GLC-LH-SMD Multi-mode fiber (MMF) 7.3(0)DX(1)
GLC-SX-MMD
CWDM-SFP-xxxx2 Single-mode fiber (SMF) 7.3(0)DX(1)
DWDM-SFP-xxxx
GLC-BX-U
GLC-BX-D
GLC-EX-SMD
GLC-LH-SMD
GLC-ZX-SMD

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


23
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-SR Multi-mode fiber (MMF) 7.3(0)DX(1)
SFP-10G-SR-S 10G BASE-SR SFP+ transceiver 8.0(1)
module for Multi-mode fiber
(MMF)
DWDM-SFP10G-xx.xx3 Single-mode fiber (SMF) 7.3(0)DX(1)
SFP-10G-BXD-I
SFP-10G-BXU-I
SFP-10G-LRM
SFP-10G-ER 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-ER-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-10G-LR 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-LR-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-10G-ZR 10G BASE-LR SFP+ transceiver 7.3(0)DX(1)
module for Single-mode fiber
(SMF)
SFP-10G-ZR-S 10G BASE-LR SFP+ transceiver 8.0(1)
module for Single-mode fiber
(SMF)
SFP-H10GB-CU1M Twinax cable assembly, passive 7.3(0)DX(1)
SFP-H10GB-CU1-5M
SFP-H10GB-CU2M
SFP-H10GB-CU2-5M
SFP-H10GB-CU3M
SFP-H10GB-CU5M
SFP-H10GB-ACU7M Twinax cable assembly, active 7.3(0)DX(1)
SFP-H10GB-ACU10M

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


24
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
SFP-10G-AOC1M Active optical cable assembly 7.3(0)DX(1)
SFP-10G-AOC2M
SFP-10G-AOC3M
SFP-10G-AOC5M
SFP-10G-AOC7M
SFP-10G-AOC10M
N7K-M202CF-22L CFP-40G-SR4 40GBASE-SR4 CFP 6.1(2)
CFP-40G-LR4 40GBASE-LR4 CFP 6.1(2)
CFP-100G-SR10 100GBASE-SR10 CFP 6.1(3)
CFP-100G-LR4 100GBASE-LR4 CFP 6.1(1)
CFP-100G-ER4 100GBASE-ER4 CFP 6.2(10)
N7K-M206FQ-23L FET-40G Cisco 40G Fabric Extender 6.2(6)
Transceiver (FET)
QSFP-40G-SR-BD Cisco 40G BiDi QSFP+ 6.2(6)
QSFP-40G-SR4 40GBASE-SR4 QSFP+ 6.1(1)
QSFP-40G-SR4-S
QSFP-40G-CSR4 40GBASE-CSR4 QSFP+ 6.2(2)
QSFP-40GE-LR4 40GBASE-LR4 QSFP+ 6.1(4)
QSFP-40G-LR4-S
QSFP-H40G-ACUxM 40GBASE-CR4 QSFP+ Direct 6.2(2)
Attach Copper Cable Active (7 m,
10 m)
QSFP-4X10G-ACxM 40GBASE-CR4 QSFP+ to 4x 6.2(8)
SFP+ Twinax Direct Attach
Copper Breakout Cable Active
(7 m, 10 m)
QSFP-H40G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
QSFP-H40G-AOC15M 40GBASE-AOC (Active Optical 7.2(0)D1(1)
Cable) QSFP Cable (15m)
QSFP-4X10G-AOCxM 40GBASE-AOC (Active Optical 6.2(8)
Cable) QSFP to 4x10G SFP+
Breakout Cable (1 m, 2 m, 3 m,
5 m, 7 m, 10 m)
WSP-Q40GLR4L 40GBASE-LR4 lite (2km SMF) 62(10)
QSFP+

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


25
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
QSFP-40G-LR4 40GBASE-LR4 QSFP+ (Ethernet 6.2(12)
and OTU3 capable)
QSFP-40G-ER4 40GBASE-ER4 QSFP+ (40km) 6.2(12)
N7K-M324FQ-25L CVR-QSFP-SFP10G QSFP 40G to SFP+ 10G Adapter 8.2(1)
Module
FET-40G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
QSFP-H40G-ACUxM Direct attach copper, active 8.0(1)
QSFP-H40G-AOCxM Active optical cable assembly 8.0(1)
QSFP-4X10G-AC7M Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-AC10M Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-ACUxM Direct attach breakout copper, 8.0(1)
active
QSFP-4X10G-AOC1M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC2M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC3M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC5M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC7M Active optical breakout cable 8.0(1)
assembly
QSFP-4X10G-AOC10M Active optical breakout cable 8.0(1)
assembly
QSFP-40G-CSR4 Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-ER4 Single-mode fiber (SMF) 8.0(1)
QSFP-4x10G-LR-S Single-mode fiber (SMF) 8.0(1)
QSFP-40G-LR4 Single-mode fiber (SMF) 8.0(1)
QSFP-40G-LR4-S Single-mode fiber (SMF) 8.0(1)
QSFP-40G-SR4 Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-SR4-S Multi-mode fiber (MMF) 8.0(1)
QSFP-40G-SR-BD Multi-mode fiber (MMF) 8.0(1)
2
N7K-M348XP-25L CWDM-SFP-xxxx Single-mode fiber (SMF) 7.3(0)DX(1)
CWDM-SFP 10G-1xxx Single-mode fiber (SMF) 8.0(1)
DWDM-SFP-xxxx Single-mode fiber (SMF) 7.3(0)DX(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


26
System Requirements

Table 4 Transceivers Supported by Cisco NX-OS Software Releases (continued)

Minimum
Software
I/O Module Product ID Transceiver Type Version
DWDM-SFP 10G-xx.xx Single-mode fiber (SMF) 8.0(1)
FET-10G Cisco Fabric Extender Transceiver 8.1(1)
(FET)
GLC-BX-U Single-mode fiber (SMF) 7.3(0)DX(1)
GLC-BX-D
GLC-EX-SMD
GLC-LH-SMD
GLC-ZX-SMD
GLC-LH-SMD Multi-mode fiber (MMF) 7.3(0)DX(1)
GLC-SX-MMD
GLC-TE Category 5 7.3(0)DX(1)
SFP-10G-AOCxM Active optical cable assembly 8.0(1)
SFP-10G-BXU-I Single-mode fiber (SMF) 8.0(1)
SFP-10G-BXD-I Single-mode fiber (SMF) 8.0(1)
SFP-10G-ER Single-mode fiber (SMF) 8.0(1)
SFP-10G-LR Single-mode fiber (SMF) 8.0(1)
SFP-10G-LRM Single-mode fiber (SMF) 8.0(1)
SFP-10G-SR Multi-mode fiber (MMF) 8.0(1)
SFP-10G-ZR Single-mode fiber (SMF) 8.0(1)
SFP-H10GB-ACU7M Twinax cable assembly, active 8.0(1)
SFP-H10GB-ACU10M Twinax cable assembly, active 8.0(1)
SFP-H10GB-CU1M Twinax cable passive 8.0(1)
SFP-H10GB-CU1-5M Twinax cable passive 8.0(1)
SFP-H10GB-CU2M Twinax cable passive 8.0(1)
SFP-H10GB-CU2-5M Twinax cable passive 8.0(1)
SFP-H10GB-CU3M Twinax cable passive 8.0(1)
SFP-H10GB-CU5M Twinax cable passive 8.0(1)

1
Minimum version supported is -02.
2
CWDM-SFP-xxxx is supported only with 1-Gigabit Ethernet I/O modules.
3
DWDM-SFP10G-C is not supported.
4
For Cisco NX-OS 8.x releases, CPAK-100G-SR4 is supported from Cisco NX-OS Release 8.1(1).
#
If you remove and reinsert a CPAK, reinsertion must be delayed by at least 30 seconds. This enables the device to discharge
completely and power up properly upon reinsertion.

Note For a complete list of supported optical transceivers, see the Cisco Transceiver Module Compatibility
Information page.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


27
Guidelines and Limitations

Guidelines and Limitations


This section includes the following topics:
• Guidelines and Limitations—Cisco NX-OS Release 8.2(1), page 28
• Guidelines and Limitations—Cisco NX-OS Release 8.1(1), page 29
• Guidelines and Limitations—Cisco NX-OS Release 8.0(1), page 30
• Guidelines and Limitations Common for Cisco NX-OS Release 8.0(1) and Cisco NX-OS Release
8.1(1), page 31

Guidelines and Limitations—Cisco NX-OS Release 8.2(1)


This section describes the guidelines and limitations for the Cisco Nexus 7000 Series in Cisco NX-OS
Release 8.2(1).
• When you run Cisco NX-OS Release 8.2(1) on a Cisco Nexus 7000 or Cisco Nexus 7700 switches
having overlay technology (OTV, VXLAN or L2VPN/VPLS) configuration with M3 series modules,
there is a chance that some Layer 2 tunneled multicast traffic might be mis-forwarded due to scale
conditions on the M3 module or the M3 module might go into a failure state with the following error:
FATAL interrupt with Error Description: BEM_EL3_CTL_INVLD
%MODULE-2-MOD_SOMEPORTS_FAILED: Module 1 (Serial number: JAE202004WF) reported failure
on ports Ethernet1/7 (Ethernet) due to fatal error in device DEV_SLF_BRI (device error
0xce401600)

For more information and workaround details refer to CSCvg09282.


In order to check and confirm if you come across this issue, look for the exact failure reason using
the sh module internal exceptionlog module <mod_num> command.
This defect can affect a Cisco Nexus 7000 or Cisco Nexus 7700 chassis running M3 modules under
the following condition. (This issue is specific to M3 modules and not applicable to F3 or any other
modules.)
– OTV or VXLAN with scaled configuration close to 2K VLANs/BD extended.
– Network churn in a short period of time (multiple overlay flaps within 10 minutes) which
involves bringing down the tunnels and recreating them in the system might lead to above
symptoms.
The workaround for this issue is to reload the affected M3 module. To avoid re-occurrence of this
problem, reduce the number of VLANs/BD extended over DCI.
A SMU for this fix is being tested and validated and will be published to the field.
• All Virtual Private LAN Services (VPLS) and Ethernet over MPLS (EoMPLS) functionalities,
except Ethernet Flow Points (EFP), service instances, and bridge domains, are supported on
M3-Series I/O modules.
• Flexible ACL TCAM bank chaining is supported on the M2 Series modules in Cisco NX-OS Release
8.2(1) along with the existing support for the M3 Series modules.
• Starting with Cisco NX-OS Release 8.2(1), FabricPath feature is supported on a VDC that has M3
and F3 Series modules.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


28
Guidelines and Limitations

• When you use the storm-control unicast level percentage command in a module, both the unknown
and known unicast traffic gets discarded after reaching the threshold value.
VXLAN BGP EVPN and OTV inter operation feature has the following limitations on M3 modules for
in Cisco NX-OS Release 8.2(1):
• This feature is supported only on the M3-only VDC.
• A secondary IP has to be configured on each BDI. Anycast IP should also be configured, it acts as
a primary and continue to be used on the VXLAN side.
• To enable seamless mobility across legacy and VXLAN PODs, HSRP MAC and Anycast gateway
MAC should be explicitly cross configured as gateway MAC.
• The tunnel-stitching command flaps the overlay interface.
• Static ARP is required for Layer 3 connectivity between vPC peers.
• Orphan port should not be connected to the vPC secondary.
• OTV Proxy ARP is not supported for OTV with BDI.
• VXLAN ARP Suppression and OTV Proxy ARP should be consistently configured.
• There is no ISSU support for VXLAN with OTV and BDI feature.
• Router-on-a-stick approach is used for overlay multicast routing.
• OTV loopback is not supported.
• Migration option 1 or option 2 should be used in Cisco NX-OS Release 8.2(1).
• Layer 3 multicast routing is not supported on border leaf with VXLAN+OTV extension.
• Two overlays on a same join interface are not supported.
• VXLAN BGP EVPN and OTV inter operation feature does not have any convergence improvements
in Cisco NX-OS Release 8.2(1).
• VXLAN BGP EVPN and OTV inter operation feature supports only 3 OTV sites in Cisco NX-OS
Release 8.2(1).

Guidelines and Limitations—Cisco NX-OS Release 8.1(1)


This section describes the guidelines and limitations in Cisco NX-OS Release 8.1(1) for the Cisco Nexus
7000 Series.
• vPC+ feature is supported on the M3 modules in Cisco NX-OS Release 8.1(1).
• FabricPath feature is not supported on a VDC that has M3 and F3 modules in Cisco NX-OS Release
8.1(1).
• The in-band Power On Auto Provisioning (POAP) works in any setup where connectivity to the
DHCP server is present in the in-band port. You can use the in-band port in the non-FabricPath
setups.
• In Cisco NX-OS Release 8.1(1) only the admin users are allowed to access/initiate the secure FTP
(SFTP).
• The multi-hop BFD feature supports only the static routes in Cisco NX-OS release 8.1(1),
• When you use the storm-control unicast level percentage command in a module, both the unknown
and known unicast traffic gets discarded after reaching the threshold value.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


29
Guidelines and Limitations

M3 FEX Support

The number of VLANs per Fabric Extender server interface is 300 for M3 modules.
M3 FEX does not support the following features in Cisco NX-OS Release 8.1(1):
• vPC+ / FabricPath
• PVLAN over FEX
• VSI / EVPN with FEX
• FEX AA (active-active mode)

Dynamic Routing over vPC

• Dynamic Routing over vPC feature (for IPv4 Unicast traffic only) is supported on F2E, F3, and M3
series modules in Cisco NX-OS. Dynamic Routing is not supported over vPC+.

Unsupported Features - VDC on M3 Module

The following features are not supported on a VDC that has an M3 module:
• MPLS L2VPN
• MPLS L2VPN QoS
• LISP
• Physical port vPC
• Storage VDC
• QoS Template: 7e/6e/4e network QOS: The QoS templates are globally applied from the default
VDC and hence this would not be allowed at the system level, which means if the system has an M3
module, the QoS templates would not be supported.
• PTP Pong

Guidelines and Limitations—Cisco NX-OS Release 8.0(1)


This section describes the guidelines and limitations in Cisco NX-OS Release 8.0(1) for the Cisco Nexus
7000 Series.

Unsupported Features - VDC on M3 Module

The following features are not supported on a VDC that has an M3 module:
• FabricPath
• vPC+
• MPLS L2VPN
• MPLS L2VPN QoS
• LISP
• Physical port vPC
• FEX
• Storage VDC

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


30
Guidelines and Limitations

• QoS Template: 7e/6e/4e network QOS: The QoS templates are globally applied from the default
VDC and hence this would not be allowed at the system level, which means if the system has an M3
module, the QoS templates would not be supported.
• PTP Pong

Dynamic Routing over vPC

• Dynamic Routing over vPC feature (for IPv4 Unicast traffic only) is supported only on F2E and F3
series modules in Cisco NX-OS.

Storm-control Suppresses Unicast Traffic

• When you use the storm-control unicast level percentage command in a module, both the unknown
and known unicast traffic gets discarded after reaching the threshold value.

Guidelines and Limitations Common for Cisco NX-OS Release 8.0(1) and Cisco
NX-OS Release 8.1(1)
The following guidelines and limitations are applicable to both the Cisco NX-OS Release 8.0(1) and
Cisco NX-OS Release 8.1(1).
Beginning with Cisco NX-OS Release 8.0(1), the following M1-Series I/O modules are not supported:
• Cisco Nexus 7000 M1-Series 48-port Gigabit Ethernet Module with XL Option (SFP optics)
(N7K-M148GS-11L)
• Cisco Nexus 7000 M1-Series 48-port 10/100/1000 Ethernet Module with XL Option (RJ45)
(N7K-M148GT-11L)
• Cisco Nexus 7000 M1-Series 32 Port 10GbE with XL Option, 80G Fabric (requires SFP+)
(N7K-M132XP-12L)
• Cisco Nexus 7000 M1-Series 8-Port 10 Gigabit Ethernet Module with XL Option (requires X2)
(N7K-M108X2-12L)
Beginning with Cisco NX-OS Release 8.0(1), the following F2-Series I/O modules are not supported:
• Nexus 7000 F2-Series 48 Port 1G/10G Ethernet Module, SFP/SFP+ (and spare) (N7K-F248XP-25,
N7K-F248XP-25=)

VXLAN BGP EVPN in VDCs having M3 modules

The following features are not supported for VXLAN BGP EVPN in VDCs having M3 modules:
• EVPN VXLAN leaf functionality (except Border Leaf functionality) is not supported.
• LISP hand off is not supported.
• Hosts connected behind FEX is not supported.

EVPN Border Leaf Hand Off Limitation in M3 Module

This limitation is on the EVPN to VRF lite hand off.


If EVPN fabric connected interface is on a M3 module and VRF lite interface is on F3 module, south to
north traffic will be dropped on the border leaf.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


31
Guidelines and Limitations

Smart Licensing Show Commands are Missing on Non-Default VDC Context

Smart Licensing show commands are missing on the non-default VDC context. The work around is to
use the default VDC to verify license related show outputs.

OTV Traffic Fails on VXLAN EVPN Border Leaf Due To ARP Resolution Failure

OTV traffic fails on VXLAN EVPN border leaf due to ARP resolution failure. This issue occurs on the
following conditions:
• Dual switch VPC Border Leaf
• M3 only VDC setup
• vPC legs connected to OTV VDC
• Reloading the switch
• Using shutdown and no shutdown commands on the port-channel logical interface
The workaround to his issue is to do a ‘shutdown’ and ‘no shutdown’ of vPC port-channel member
interfaces from both the vPC switches and then re-send the ARP for the flows.

Note Port-channel interface shut and no shut may not work,

Native VLAN Change Causes Link Flap

Changing the native VLAN on an access port or trunk port will flap the interface. This behavior is
expected.

Passive Copper Optic Cables are not Supported on the Non EDC Ports

Passive copper optic cables are not supported on the non-EDC ports.
The delay in link up event in SFP+ implementation is due to a factor called Electronic Dispersion
Compensation (EDC). EDC ports mitigate power penalties associated with optical link budgets.
Receivers without EDC (for example - SFP, where there is no delay in bringing the port up) can recover
an optical signal only if the dispersion is less than approximately one-half Unit Interval (UI) over the
length of fiber.
QSFP passive copper (QSFP-H40G-CU1M, QSFP-H40G-CU3M, QSFP-H40G-CU5M), and copper
breakout cables (QSFP-4SFP10G-CU1M, QSFP-4SFP10G-CU3M, QSFP-4SFP10G-CU5M) are not
supported on the following modules:
– N7K-M206FQ-23L
– N7K-F312FQ-25
– N77-F324FQ-25
The workaround to this limitation is to use active optical cables (QSFP-H40G-AOC1M,
QSFP-H40G-AOC3M, QSFP-H40G-AOC5M) and active optical breakout cables
(QSFP-4X10G-AOC1M, QSFP-4X10G-AOC3M, QSFP-4X10G-AOC5M).
The passive optics (N7K M3 40G, N77 M3 40G, and N77 M3 100G) are not supported on the following
modules:
– N7K-M324FQ-25L
– N77-M324FQ-25L

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


32
Guidelines and Limitations

– N77-M312CQ-26L

MPLS over GRE

MPLS over GRE is not supported on F3 and M3 modules.

VLAN Translation on Fabric Extender Is Not Supported

VLAN translation on fabric extender is not supported. If you need to map a VLAN, you must move the
interface to the parent switch and then configure the VLAN translation on the switches directly. The
VLAN translation configuration is applicable for trunk ports connecting two data centers.

The no hardware ejector enable Command is Not Recommended for Long-Term Use

The no hardware ejector enable command cannot be configured and persistently saved in the startup
configuration. This command is intended for temporary usage.
To work around this limitation, do not physically remove an active supervisor. Instead, use the system
switchover command to switch to the standby supervisor.
This applies only to the Cisco Nexus 7700 Series switches.

Saving VLAN Configuration Information

Because a VLAN configuration can be learned from the network while the VLAN Trunking Protocol
(VTP) is in a server/client mode, the VLAN configuration is not stored in the running configuration. If
you copy the running configuration to a file and apply this configuration at a later point, including after
a switch reload, the VLANs will not be restored. However, the VLAN configuration will be erased if the
switch is the only server in the VTP domain.
To work around this limitation, perform one of the following tasks:
• Configure one of the clients as the server.
• Complete these steps:
1. Copy the VTP data file to the bootflash: data file by executing the copy vtp-datafile
bootflash:vtp-datafile command.
2. Copy the ASCII configuration to the startup configuration by executing the copy ascii-cfg-file
startup-config command.
3. Reload the switch.
This limitation does not apply to a binary configuration, which is the recommended approach, only for
an ASCII configuration.

Behavior of Control Plane Packets in an F2e Series Module

To support the coexistence of an F2e Series module with an M Series module in the same VDC, the F2e
Series module operates in a proxy mode so that all the Layer 3 traffic is sent to an M Series module in
the same VDC. For F2e proxy mode, having routing adjacencies connected through F2e interfaces with
an M1 Series module is not supported. However, routing adjacencies connected through F2e interfaces
with an M2 Series module is supported.

Error Appears When Copying a File to the Running Configuration

Copying a file to the running configuration can trigger an error and the following message is displayed:

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


33
Guidelines and Limitations

"WARNING! there is unsaved configuration"

This issue might occur if the configuration contains SNMP-related configurations to send traps or
notifications, and if the file that is to be copied to the running configuration contains only EXEC show
commands.
When the following message is displayed, enter y.
“This command will reboot the system. (y/n)? [n] y.”

Note that there is no operational impact and no configuration loss when the switch reloads.

PONG in a vPC Environment

PONG is not supported in a vPC environment in the following scenarios:


• In a vPC environment, a PONG to an access switch or from an access switch might fail. To work
around this issue, use the interface option while executing a PONG from an access switch to a vPC
peer. The interface can be one that does not have to go over the peer link, such as an interface that
is directly connected to the primary switch.
• When FabricPath is enabled and there are two parallel links on an F2 Series module, PONG might
fail. To work around this issue, form a port channel with the two links as members.
For more details on PONG, refer to the Cisco Nexus 7000 Series NX-OS Troubleshooting Guide.

LISP Traffic

A Layer 3 link is required between aggregation switches when deploying LISP host mobility on
redundant LISP Tunnel Routers (xTRs) that are a part of a vPC. In rare (but possible) scenarios, failure
to deploy this Layer 3 link might result in traffic being moved to the CPU and potentially dropped by the
Control Plane Policing (CoPP) rate limiters.

Standby Supervisor Might Reset with a Feature-Set Operation

The standby supervisor might reload when a feature-set operation (install, uninstall, enable, or disable)
is performed if the high availability (HA) state of the standby supervisor is not “HA standby” at the time
of the feature-set operation. To prevent the reload, ensure that the state of the standby supervisor is “HA
standby.” To check the HA state for the specific virtual device context (VDC) where the feature-set
operation is performed, enter the show system redundancy ha status command on the active supervisor.
A reload of the standby supervisor has no operational impact because the active supervisor is not
affected.
In addition, if you perform a feature-set operation while modules are in the process of coming up, then
those modules are power cycled. Modules that are up and in the OK state are not power cycled when you
perform a feature-set operation.

Unfair Traffic Distribution for Flood Traffic

Uneven load balancing of flood traffic occurs when you have a seven-member port channel. This
behavior is expected, and occurs on all M Series and F Series modules. In addition, M Series modules
do not support Result Bundle Hash (RBH) distribution for multicast traffic.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


34
Guidelines and Limitations

BFD Not Supported on the MTI Interface

If bidirectional forwarding detection (BFD) on Protocol Independent Multicast (PIM) is configured


together with MPLS multicast VPN (MVPN), the following error might appear:
2012 Jan 3 15:16:35 dc3_sw2-dc3_sw2-2 %PIM-3-BFD_REMOVE_FAIL: pim [22512] Session remove
request for neighbor 11.0.3.1 on interface Ethernet2/17 failed (not enough memory)

This error is benign. To avoid the error, disable BFD on the multicast tunnel interface (MTI) interface.
For every multicast domain of which an multicast VRF is a part, the PE router creates a MTI. MTI is an
interface the multicast VRF uses to access the multicast domain.

Role-Based Access Control

You can configure role-based access control (RBAC) in the Cisco Nexus 7000 storage VDC using Cisco
NX-OS CLI commands. You cannot configure RBAC in the Cisco Nexus 7000 storage VDC using Cisco
Data Center Network Manager (DCNM). Note that RBAC in the storage VDC and in the Cisco Nexus
7000 Series switches is the same, which is different from that for the Cisco MDS 9500 Series Multilayer
Directors.
RBAC CLI scripts used in Cisco MDS 9500 Series Multilayer Directors cannot be applied to the storage
VDC configured for a Cisco Nexus 7000 Series switch.
You cannot distribute the RBAC configuration between a Cisco MDS 9500 Series switch and the storage
VDC configured for a Cisco Nexus 7000 Series switch. To prevent this distribution, assign RBAC in
Cisco MDS and the Cisco Nexus 7000 storage VDC to different Cisco Fabric Services (CFS) regions.

Limitation on the Level 4 Protocol Entries on the M Series Modules

The M Series modules support only 7 entries for Layer-4 protocols (L4Ops).

SVI Statistics on an F2 Series Module

F2 Series I/O modules do not support per-VLAN statistics. Therefore, the show interface command will
not display per-VLAN Rx or Tx counters or statistics for switch virtual interfaces (SVIs).

TrustSec SGT on the F3 Series Modules

F3 Series I/O modules require a dot1q header to be present for proper processing and transport of
SGT-tagged packets. For Layer 2 switch ports use trunked interfaces instead of an access VLAN. Layer
3 interfaces should be configured as an L3 subinterface to force the dot1q over the L3 interconnection.

Fabric Module Removal on the Cisco Nexus 7700 Switches

When a fabric module is power cycled or removed momentarily during an online insertion and removal
(OIR) from slot 5 or slot 6 on a Cisco Nexus 7700 switch, packet drops can occur. This limitation is not
applicable to Cisco Nexus 7702 Switches.

Fabric Utilization on the Cisco Nexus 7700 Switches

When traffic ingresses from a module on the Cisco Nexus 7700 switch at a rate much below the line rate,
uniform fabric utilization does not occur across the fabric modules. This behavior is expected and
reflects normal operation based on the fabric autospreading technology used in the Cisco Nexus 7700
switch.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


35
Upgrade and Downgrade Paths and Caveats

MTU Changes do not Take Effect on FEX Queues

When you change the interface MTU on a fabric port, the configured MTU on the FEX ports are not
configured to the same value. This issue occurs when the interface MTU changes on a fabric port.
The configured MTU for the FEX ports is controlled by the network QoS policy. To change the MTU
that is configured on the FEX ports, modify the network QoS policy to also change when the fabric port
MTU is changed.

Multicast Traffic is Forwarded to FEX Ports

Multicast traffic that is sent to Optimized Multicast Flooding (OMF) Local Targeting Logic (LTL) is
forwarded to FEX ports that are not a part of the bridge domain (BD). This issue occurs when multicast
traffic is sent to OMF LTL, which occurs if an unknown unicast flooding occurs when OMF is enabled.
FEX interfaces can support multicast routers, but OMF must be disabled on those VLANs. If there is a
multicast MAC address mismatch on the VLAN, traffic will be flooded in the VLAN and will eventually
reach the router behind the FEX port.

F2 Connectivity Restrictions on Connecting Ports to an FEX

If an ASCII configuration has incompatible ports, such as when the configuration is created with ports
that are added to an FEX from different modules or VDC types, the ports might be added without
warnings.
When connecting F2 Series ports to the same FEX, make sure the VDC type is the same as in the source
configuration that is being replicated.

DHCP Snooping and vPC+ FEX

DHCP snooping is not supported when the vPC+ FEX feature is enabled.

Upgrade and Downgrade Paths and Caveats


This section includes information about upgrading and downgrading Cisco NX-OS software on Cisco
Nexus 7000 Series switches. It includes the following sections:
• Supported Upgrade and Downgrade Paths
• ISSU Upgrade
• In-Service Software Upgrade (ISSU) Caveats
• Non-ISSU Upgrade/Cold Boot Upgrade
• Non-In-Service Software Upgrade (Non-ISSU)/Cold Boot Upgrade Caveats
• Non-ISSU/Cold Boot Downgrade

Supported Upgrade and Downgrade Paths


Before you upgrade or downgrade your Cisco NX-OS software, we recommend that you read the
complete list of caveats in this section to understand how an upgrade or downgrade might affect your
network, depending on the features that you have configured.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


36
Upgrade and Downgrade Paths and Caveats

Note Do not change any configuration settings or network settings during a software upgrade. Changes to the
network settings might cause a disruptive upgrade.

Releases that are not listed for a particular release train do not support a direct ISSU.

Note For a nondisruptive upgrade dual supervisor modules are required.

ISSU Paths for Cisco NX-OS Release 8.2(2)


See Table 5 for the In-Service Software Upgrade (ISSU) paths for Cisco NX-OS Release 8.2(2).

Note Only the ISSU paths/combinations in Table 5 have been tested and are supported.

Table 5 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.2(2))

Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.2(2) 8.2(1)
8.1(2a)
8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(3)
7.3(2)D1(2)
7.3(2)D1(1)

Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 5, a reload is required.

ISSU Paths for Cisco NX-OS Release 8.1(2a)


See Table 6 for the In-Service Software Upgrade (ISSU) paths for Cisco NX-OS Release 8.1(2a).

Note Only the ISSU paths/combinations in Table 6 have been tested and are supported.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


37
Upgrade and Downgrade Paths and Caveats

Table 6 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.1(2a))

Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.1(2a) 8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(3)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)

Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 6, a reload is required.

ISSU Paths for Cisco NX-OS Release 8.1(2)


See Table 7 for the In-Service Software Upgrade (ISSU) paths for Cisco NX-OS Release 8.1(2).

Note Only the ISSU paths/combinations in Table 7 have been tested and are supported.

Table 7 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.1(2))

Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.1(2) 8.1(1)
8.0(1)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)

Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 7, a reload is required.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


38
Upgrade and Downgrade Paths and Caveats

ISSU Paths for Cisco NX-OS Release 8.2(1)


See Table 8 for the In-Service Software Upgrade (ISSU) paths for Cisco NX-OS Release 8.2(1).

Note Only the ISSU paths/combinations in Table 8 have been tested and are supported.

Table 8 Supported ISSU Paths for Cisco Nexus 7000 Series Switches and Cisco Nexus 7700
Switch (Cisco NX-OS Release 8.2(1))

Current Release
Target Release Supporting Direct ISSU Upgrade to Target Release
Cisco NX-OS Release 8.2(1) 8.1(1)
8.0(1)
7.3(2)D1(1)

Multihop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 8, a reload is required.

ISSU Paths for Cisco NX-OS Release 8.1(1)


See Table 9 for the in-service software upgrade (ISSU) path for Cisco NX-OS Release 8.1(1).

Note Only the ISSU combinations in the following table, Table 9 have been tested and are supported.

Table 9 Supported ISSU Paths for the Cisco Nexus 7000 and Cisco Nexus 7700 Series Chassis
(Cisco NX-OS Release 8.1(1)

Current Release
Supporting Direct ISSU
Target Release Upgrade to Target Release
Cisco NX-OS Release 8.0(1)
8.1(1) 7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)

Note Multi-hop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 9, a reload is required.

ISSU Paths for Cisco NX-OS Release 8.0(1)


See Table 10 for the in-service software upgrade (ISSU) path for Cisco NX-OS Release 8.0(1).

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


39
Upgrade and Downgrade Paths and Caveats

Note Only the ISSU combinations in the following table, Table 10 have been tested and are supported.

Table 10 Supported ISSU Paths for the Cisco Nexus 7000 and 7700 Series Chassis (Cisco
NX-OS Release 8.0(1)

Current Release
Supporting Direct ISSU
Target Release Upgrade to Target Release
Cisco NX-OS Release 7.3(1)D1(1)
8.0(1)
7.3(0)DX(1)
7.3(0)D1(1)

Note Multi-hop ISSU is not supported. If you are upgrading from a release other than the nondisruptive
upgrade releases listed in Table 10, a reload is required.

ISSU Upgrade
To perform an ISSU to Cisco NX-OS Release 8.0(1) and later releases, follow these steps:
1. Enter the show running-config aclmgr inactive-if-config command for all VDCs.
2. Enter the clear inactive-config acl command for all VDCs.
3. If the configuration has any mac packet-classify configurations on any interfaces, remove all of the
configurations by entering the no mac packet-classify command.
4. Start the ISSU procedure.

In-Service Software Upgrade (ISSU) Caveats


• When you perform ISSU from Cisco NX-OS Release 8.1(1) to Cisco NX-OS Release 8.2(1) or to
Cisco NX-OS Release 8.1(2) HSRP VIP is not reachable from the standby device. ARP for VIP
shows resolved or complete on the standby Cisco Nexus 7000 device but it is shown as a static entry.
When you face this symptom flap the HSRP state from standby to active. You can configure preempt
on both the peers and then bump the priority on the HSRP standby so that it takes an active role.
• Before performing ISSU to Cisco NX-OS Release 8.2(1) from earlier releases, with the given bridge
domain configurations, make sure NVE interface is brought up (by using the no shut command). If
the NVE interface is not brought up, bridge domains may not come up after performing ISSU and
when you run the no shut command. The issue occurs because the NVE interface is in “shut” state
with bridge domain configurations during the ISSU. If you perform ISSU to Cisco NX-OS Release
8.2(1) from earlier releases with NVE interface in “no shut” state, upgrade will happen successfully.
• When you configure ip directed-broadcast <acl-name> command with the acl-name as hw-assist,
you cannot delete this configuration post ISSU. This is applicable to releases prior to Cisco NX-OS
Release 8.2(1).

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


40
Upgrade and Downgrade Paths and Caveats

• The CoPP statistics accumulated before ISSU to Cisco NX-OS Release 8.1(1) are not retained after
the ISSU. If you want to retain the CoPP statistics from earlier releases, back it up before you
perform the ISSU to Cisco NX-OS Release 8.1(1).
• When you perform ISSU in a set up where the Routing Information Protocol (RIP) has dependency
on other protocols for redistribution, you should adjust the RIP timers because RIP does not support
stateful restart. Use the timers basic update invalid holddown flush command in the
address-family-mode under the router configuration mode to adjust the timer values.
• ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with RISE
configuration:
– RISE configuration must be removed prior to starting your upgrade to Cisco NX-OS Release
8.0(1). ISSU performs compatibility check and blocks the upgrade if RISE is configured.
• If the RISE feature is not configured, there is no impact on the ISSU.
• If the RISE feature is configured you will be prompted to remove this feature in order to
proceed with the ISSU. You can proceed with the upgrade only after you disable this feature.
– Sample CLI output:
"Running-config contains configuration that is incompatible with the new
image (strict incompatibility).
Please run 'show incompatibility-all system <image>' command to find out
which feature needs to be disabled.”.
Pre-upgrade check failed. Return code 0x40930029 (Current running-config is
not supported by new image).
switch# show incompatibility-all system n7000-s2-dk9.8.0.1.bin

Checking incompatible configuration(s) for vdc 'switch':


--------------------------------------------------------
No incompatible configurations

Checking dynamic incompatibilities for vdc 'switch':


----------------------------------------------------
Service : iscm , UUID: 1144
Description : Rise ISSU script
Compatibility requirement: STRICT
Workaround:
ISSU from version < 8.0(1) not supported when Rise feature is enabled.

• ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with VXLAN
configuration in a vPC setup:
ISSU upgrade from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) with VXLAN
configuration in a vPC setup can result in a traffic loss when the second vPC peer is upgraded.
The following upgrade steps are recommended as the workaround for this issue:
– Shutdown vPC on the vPC secondary and reload with 8.0(1).
– Perform no shut vpc after the system is operational,
– Perform a vPC role change so that vPC secondary becomes a vPC primary.
– Shutdown vPC on the other peer that is still running 7.3 release and reload with 8.0(1).
– Perform no shut vpc after the system is operational,
– Optionally, a vPC role change can be performed to get the latest peer back to vPC primary.
• If ISSU fails during a FEX module upgrade, you need to clear the flash as per the following steps
and then proceed with the upgrade:
– rlogin to the failing FEX—rlogin 192.0.2.<FEX-ID> -l root

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


41
Upgrade and Downgrade Paths and Caveats

– umount /mnt/cfg
– flash_eraseall /dev/mtd5
– mount -t jffs2 -rw /dev/mtdblock5 /mnt/cfg

The mount command enables you to mount a file from a source folder to a destination folder.
• FCoE FEX
– After ISSU upgrade, you must change the port-channel load balance for FEX, that is, from
default VDC, in order to apply load balancing for SAN traffic:

Device(config)# port-channel load-balance src-dst mac fex 101


– You can revert back to the default load balance after changing the load balance for FEX.
• For details on ISSU for other earlier releases refer to the following:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/7_x/nx-os/release/notes/7x_nx-os_r
elease_note.html
• For multihop ISSU scenario for releases earlier than Cisco NX-OS Release 7.2(0) refer to the
following:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/6_x/nx-os/release/notes/62_nx-os_r
elease_note.html#pgfId-812362.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


42
Upgrade and Downgrade Paths and Caveats

Non-ISSU Upgrade/Cold Boot Upgrade


Cisco NX-OS Release 8.2(2) supports the following cold boot support matrix:

Table 11 Supported Cold Boot Matrix in Cisco NX-OS Release 8.2(2)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.2(2) 8.2(1)
8.1(2a)
8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(20)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.2(8b)
6.2(8a)
6.1(5a)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


43
Upgrade and Downgrade Paths and Caveats

Cisco NX-OS Release 8.1(2a) supports the following cold boot support matrix

Table 12 Supported Cold Boot Matrix in Cisco NX-OS Release 8.1(2a)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.1(2a) 8.1(2)
8.1(1)
8.0(1)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(20)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.2(8b)
6.2(8a)
6.1(5a)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


44
Upgrade and Downgrade Paths and Caveats

Cisco NX-OS Release 8.1(2) supports the following cold boot support matrix:

Table 13 Supported Cold Boot Matrix in Cisco NX-OS Release 8.1(2)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.1(2) 8.1(1)
8.0(1)
7.3(2)D1(2)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(20)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.2(8b)
6.2(8a)
6.1(5a)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


45
Upgrade and Downgrade Paths and Caveats

Cisco NX-OS Release 8.2(1) supports the following cold boot support matrix:

Table 14 Supported Cold Boot Matrix in Cisco NX-OS Release 8.2(1)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.2(1) 8.1(1)
8.0(1)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.2(8b)
6.2(8a)
6.1(5a)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


46
Upgrade and Downgrade Paths and Caveats

Cisco NX-OS Release 8.1(1) has the following cold boot support matrix:

Table 15 Supported Cold Boot Matrix in Cisco NX-OS Release 8.1(1)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.1(1) 8.0(1)
7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.2(8b)
6.2(8a)
6.1(5a)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


47
Upgrade and Downgrade Paths and Caveats

Cisco NX-OS Release 8.0(1) has the following cold boot support matrix:

Table 16 Supported Cold Boot Matrix in Cisco NX-OS Release 8.0(1)


Current Release
Supporting Cold-Boot
Target Release Upgrade to Target Release
8.0(1) 7.3(2)D1(1)
7.3(1)D1(1)
7.3(0)DX(1)
7.3(0)D1(1)
7.2(2)D1(2)
7.2(2)D1(1)
7.2(1)D1(1)
7.2(0)D1(1)
6.2(18)
6.2(16)
6.2(14)
6.2(12)
6.2(10)
6.1(5a)

Note Non-ISSU upgrades are also referred to as cold boot upgrade.

To perform a non-ISSU upgrade (cold boot upgrade) to Cisco NX-OS Release 8.0(1) and later releases
from any prior supported releases in Table 16 follow these steps:
1. Change the boot variable, as shown here:

Example for Cisco NX-OS Release 8.2(1)

boot kickstart bootflash:/n7000-s2-kickstart.8.2.1.bin sup-1


boot system bootflash:/n7000-s2-dk9.8.2.1.bin sup-1
boot kickstart bootflash:/n7000-s2-kickstart.8.2.1.bin sup-2
boot system bootflash:/n7000-s2-dk9.8.2.1.bin sup-2

Example for Cisco NX-OS Release 8.1(1)

boot kickstart bootflash:/n7000-s2-kickstart.8.1.1.bin sup-1


boot system bootflash:/n7000-s2-dk9.8.1.1.bin sup-1
boot kickstart bootflash:/n7000-s2-kickstart.8.1.1.bin sup-2
boot system bootflash:/n7000-s2-dk9.8.1.1.bin sup-2

Example for Cisco NX-OS Release 8.0(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


48
Upgrade and Downgrade Paths and Caveats

boot kickstart bootflash:/n7000-s2-kickstart.8.0.1.bin sup-1


boot system bootflash:/n7000-s2-dk9.8.0.1.bin sup-1
boot kickstart bootflash:/n7000-s2-kickstart.8.0.1.bin sup-2
boot system bootflash:/n7000-s2-dk9.8.0.1.bin sup-2

2. Enter the copy running-config startup-config vdc-all command.


3. Enter the reload command to reload the switch.

Note Allow some time after the reload for the configuration to be applied.

Reload based NXOS downgrades involve rebuilding the internal binary configuration from the
text-based startup configuration. This is done to ensure compatibility between the binary configuration
and the downgraded software version. As a result, certain specific configuration may be missing from
the configuration, after downgrade, due to ASCII replay process. This would include FEX HIF port
configuration and VTP database configuration. Furthermore, NX-OS configurations that require VDC
or switch reload to take effect may require additional reload when applied during the downgrade process.
Examples of this include URIB/MRIB shared memory tuning, custom reserved VLAN range and
Fabricpath Transit Mode feature. In order to mitigate this during downgrade, you should copy your full
configuration to bootflash/tftpserver.
Feature Support:
Any features introduced in a release must be disabled before downgrading to a release that does not
support those features.
Unsupported Modules:
When manually downgrading from a Cisco NX-OS Release to an earlier release, first power down all
modules that are unsupported in the downgrade image. Then, purge the configuration of the unsupported
modules using the purge module module_number running-config command.
For complete instructions on upgrading your software, see the Cisco Nexus 7000 Series NX-OS Upgrade
Downgrade Guide.

Non-In-Service Software Upgrade (Non-ISSU)/Cold Boot Upgrade Caveats


Cold boot/Reload upgrades from Cisco NX-OS 7.3.x releases to Cisco NX-OS Release 8.0(1) and
Cisco NX-OS Release 8.1(1) with RISE Configuration:
– RISE configuration must be removed prior to starting your upgrade to Cisco NX-OS Release
8.0(1)/Cisco NX-OS Release 8.1(1). ISSU performs compatibility check and blocks the upgrade
if RISE is configured. There is no warning displayed or prevention for the reload upgrade.
Therefore make sure to remove RISE configuration before the reload upgrade.
• There is no system check to block this upgrade path.
• Ensure that the RISE feature is disabled before attempting to upgrade to Cisco NX-OS
Release 8.0(1)/Cisco NX-OS Release 8.1(1). After upgrading to Cisco NX-OS Release
8.0(1)/Cisco NX-OS Release 8.1(1), configure RISE services as required. The RISE feature
configuration can be verified by using the show rise and show run services sc_engine
commands.
• If you upgrade to Cisco NX-OS Release 8.0(1)/Cisco NX-OS Release 8.1(1) with the RISE
configuration, RISE services will become unstable and unmanageable.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


49
Upgrade and Downgrade Paths and Caveats

– Steps to identify the error condition:


Even if the show feature command output shows RISE as enabled, no output will be
displayed if you run the show rise and show run services sc_engine commands.
– Steps to recover:
The only way to recover from this condition is to do a reload ascii on the switch.

ASCII Configuration Replay


Saving VLAN Configuration Information:
Because a VLAN configuration can be learned from the network while the VLAN Trunking
Protocol (VTP) is in a server/client mode, the VLAN configuration is not stored in the running
configuration. If you copy the running configuration to a file and apply this configuration at a
later point, including after a switch reload, the VLANs will not be restored. However, the
VLAN configuration will be erased if the switch is the only server in the VTP domain.
The following steps list the workaround for this limitation:
– Configure one of the clients as the server.
– Complete the following steps:
• Copy the VTP data file to the bootflash: data file by entering the copy vtp-datafile
bootflash: vtp-datafile command.
• Copy the ASCII configuration to the startup configuration by entering the copy
ascii-cfg-file startup-config command.
• Reload the switch with Cisco NX-OS Release 6.2(2) or a later release.
This limitation does not apply to a binary configuration, which is the recommended approach,
but only to an ASCII configuration. In addition, this limitation applies to all Cisco NX-OS
software releases for the Cisco Nexus 7000 series.
Rebind Interfaces command is not automatically executed when Replaying ASCII
configuration in Cisco NX-OS Release 6.2(x):
The rebind interfaces command introduced in Cisco NX-OS Release 6.2(2) is needed to
ensure the proper functionality of interfaces in certain circumstances. The command might be
required when you change the module type of a VDC. However, because of the disruptive
nature of the rebind interfaces command, for Cisco NX-OS Release 6.2(x) prior to Cisco
NX-OS Release 6.2(8), this limitation applies only when all of the following conditions are
met:
• The ASCII configuration file is replayed in the context of the default VDC or the admin
VDC, and at least one VDC has an F2e Series or an F3 Series module listed as supported
module types either before or after the replay.
• The limit-resource module-type commands listed in the ASCII configuration file
requires that rebind interfaces command be executed.
The following steps list the workaround for this limitation:
• Manually enter the rebind interfaces command wherever needed to the ASCII
configuration file for replay.
• Enter the rebind interfaces command immediately after you enter the limit-resource
module-type command.
• Ensure that the ASCII replay properly applies all interface configurations for all interfaces
in the relevant VDCs.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


50
Erasable Programmable Logic Device Images

Note If you boot up the switch without any startup configuration, this limitation might apply to an ASCII
replay. The reason is that without a startup configuration, the default VDC might still have certain
interfaces automatically allocated. Because of this possibility, follow the approaches to work around the
limitation.

Non-ISSU/Cold Boot Downgrade


Instructions provided below list the steps for the cold boot (non-ISSU) downgrade. The example
provided below is for a cold boot downgrade for the following:
• A switch that is running Cisco NX-OS Release 8.2(1) and Cisco NX-OS Release 8.1(1) and needs
to reload with Cisco NX-OS Release 6.2(8a).
• A switch that is running Cisco NX-OS Release 8.0(1) and needs to reload with Cisco NX-OS
Release 6.2(12).
Refer to the ASCII Configuration Replay caveats section for specific configuration caveats.
• Save the switch configuration.
– Enter copy running-config bootflash:<config.txt> vdc-all command.
• Change the boot variable to boot the target release.
• Enter copy running-config startup-config vdc-all command to save the boot variable.
• Enter write erase command to erase running configuration on the switch.
• Enter reload command.
Once the switch and all the modules are up with the target image, do the following:
• Enter the copy bootflash:<config.txt> running-config command.
• Verify that the switch is configured correctly.
• Replay the configuration copy to check if fex interfaces exist.
– Enter the copy bootflash:<config.txt> running-config command.

Erasable Programmable Logic Device Images


Cisco NX-OS Release 8.2(1) includes the following Erasable Programmable Logic Device (EPLD)
images:
• n7000-s2-epld.8.2.1.img
• n7700-s2-epld.8.2.1.img
Cisco NX-OS Release 8.1(1) includes the following Erasable Programmable Logic Device (EPLD)
images:
• n7000-s2-epld.8.1.1.img
• n7700-s2-epld.8.1.1.img
Cisco NX-OS Release 8.0(1) includes the following Erasable Programmable Logic Device (EPLD)
images:
• n7000-s2-epld.8.0.1.img

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


51
Erasable Programmable Logic Device Images

• n7700-s2-epld.8.0.1.img
Table 11 shows the modules that are supported in Cisco NX-OS Release 8.0(1), Cisco NX-OS Release
8.1(1), and Cisco NX-OS Release 8.2(1):

Table 17 Supported Modules with the FPGA in Cisco NX-OS Releases 8.0(1), 8.1(1), and 8.2(1)
Module FPGA Type Version
Cisco Nexus 7000 PMFPGA 37.000
Supervisor 2 IOFPGA 1.013
Cisco Nexus 7700 PMFPGA 20.000
Supervisor 2E
Fan-10 slot chassis (Cisco FAN 0.007
Nexus 7000 Series)
Fan-18 slot chassis (Cisco FAN 0.002
Nexus 7000 Series)
Fan-9 slot chassis (Cisco FAN 0.009
Nexus 7000 Series)
Fan-4 slot chassis (Cisco FAN 0.005
Nexus 7000 Series)
Fan-18 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-10 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-6 slot chassis (Cisco FAN 0.006
Nexus 7700 Series)
Fan-2 slot chassis (Cisco FAN 0.016
Nexus 7700 Series)
9 slot chassis PMFPGA 1.003
(N7K:FAB2-7009)
10 slot chassis PMFPGA 0.007
(N7K:FAB2-7010)
18 slot chassis PMFPGA 0.007
(N7K:FAB2-7018)
6 slot chassis PMFPGA 1.002
(N77:FAB2-7706)
10 slot chassis PMFPGA 1.003
(N77:FAB2-7710)
18 slot chassis PMFPGA 1.002
(N77:FAB2-7718)
6 slot chassis PMFPGA 0.001
(N77:FAB3-7706)
10 slot chassis PMFPGA 0.001
(N77:FAB3-7710)
18 slot chassis PMFPGA 9.008
(N77:FAB3-7718)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


52
Erasable Programmable Logic Device Images

Module FPGA Type Version


N7K:M2-10 PMFPGA 1.006
IOFPGA 1.003
SFPFPGA 1.003
EARL (Forwarding 2.012
Engine)
N7K:M2-40 PMFPGA 1.006
IOFPGA 0.012
SFPFPGA 2.008
EARL (Forwarding 2.012
Engine)
N7K:M2-100 PMFPGA 1.007
IOFPGA 0.009
SFPFPGA 0.004
EARL (Forwarding 2.012
Engine)
N7K:F2E-10 PMFPGA 1.009
IOFPGA 0.016
N77:F2E-10 PMFPGA 0.006
IOFPGA 0.005
N7K:F3-10 PMFPGA 1.000
IOFPGA 1.003
SFPFPGA 1.002
N7K:F3-40 PMFPGA 2.003
IOFPGA 1.005
N7K:F3-100 PMFPGA 2.003
IOFPGA 1.004
N77:F3-10 PMFPGA 1.007
IOFPGA 0.031
SFPFPGA 1.003
N77:F3-40 PMFPGA 1.005
IOFPGA 0.031
N77:F3-100 PMFPGA 1.008
IOFPGA 0.021
N7K:M3-10 PMFPGA 1.001
IOFPGA 1.003
SFPFPGA 1.000

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


53
New Hardware

Module FPGA Type Version


N7K:M3-40 PMFPGA 1.001
IOFPGA 1.002
SFPFPGA 1.000
N77:M3-10 PMFPGA 1.002
IOFPGA 1.003
SFPFPGA 1.000
N77:M3-40 PMFPGA 1.002
IOFPGA 1.002
DBFPGA 1.000
N77:M3-100 PMFPGA 1.000
IOFPGA 1.002
DBFPGA 1.001

For more information about upgrading to a new EPLD image, see the Cisco Nexus 7000 Series
FPGA/EPLD Upgrade Release Notes, Release 8.x.
Cisco Nexus 7700 switches have an EPLD image that is programmed on the switches. This EPLD image
is different than the EPLD image for the Cisco Nexus 7000 switches.

New Hardware
This section briefly describes the new hardware and hardware enhancements introduced in Cisco NX-OS
Release 8.2(1), Cisco NX-OS Release 8.1(1) and in Cisco NX-OS Release 8.0(1). For detailed
information about the new hardware, see the Cisco Nexus 7000 Series Hardware Installation and
Reference Guide.

Cisco NX-OS Release 8.2(1)

Cisco Nexus Fabric Extender Modules

From Cisco NX-OS Release 8.2(1), the Cisco Nexus B22 Fabric Extender (N2K-B22DELL-P) and the
Cisco Nexus Fabric Extender, N2k-C2348TQ-E are supported on the F3 Series and M3 Series I/O
modules.

Cisco NX-OS Release 8.1(1)

New Fan Tray for N7700

The 38mm fans do not meet NEBS compliance when the Cisco Nexus 7700 12-port 100-Gigabit Ethernet
I/O Module (N77-M312CQ-26L) is used in a Nexus 7700 6-slot, 10-slot, or 18-slot chassis. The new
76mm fans are required to meet NEBS compliance when the M3 12-port 100 Gigabit I/O Module
(N77-M312CQ-26L) is used in a Nexus 7700 6-slot, 10-slot, or 18-slot chassis.
• Cisco Nexus 7706 Fan (PID: N77-C7706-FAN-2)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


54
New and Enhanced Software Features

• Cisco Nexus 7710 Fan (PID: N77-C7710-FAN-2)


• Cisco Nexus 7718 Fan (PID: N77-C7718-FAN-2)

N7004 Support for M3 modules

Starting from Cisco NX-OS Release 8.1(1), the following M3-Series I/O modules are supported on the
Cisco Nexus 7004 switch:
• 48-port 1-/10-Gigabit Ethernet SFP+ I/O module (N7K-M348XP-25L)
• 24-port 40-Gigabit Ethernet QSFP+ I/O module (N7K-M324FQ-25L)

Cisco NX-OS Release 8.0(1)


The following modules are supported in Cisco NX-OS Release 8.0(1):
• Cisco Nexus 7000 series supports M2XL, F2E, F3, and M3 modules.
• Cisco Nexus 7700 series supports F2E, F3, and M3 modules.
The following M3-Series I/O modules have been introduced:
• M3-Series 12-Port 100-Gigabit Ethernet (N77-M312CQ-26L)
• M3-Series 48-Port 1-/10-Gigabit Ethernet (N7K-M348XP-25L)
• M3-Series 24-Port 10-/40-Gigabit Ethernet (N7K-M324FQ-25L)

PSM4 Support on 100G M3

The QSFP-100G-PSM4-S transceiver is supported with the M3-Series 12-Port 100-Gigabit Ethernet
(N77-M312-CQ-26L) I/O module.

Breakout Cable for M3-Series 40-Gigabit Ethernet I/O modules

Starting with Cisco NX-OS Release 8.0(1), the QSFP-4X10G-AOC transceiver with the 40GBASE-AOC
QSFP+ to four SFP+ breakout cable type is supported on the M3-Series 24-Port 10-/40-Gigabit Ethernet
I/O modules.

M3 Laser on Support

Starting with Cisco NX-OS Release 8.0(1), Laser-On support is available on the M3-Series modules.

New and Enhanced Software Features


This section includes the following topics:
• Cisco NX-OS Release 8.1(2) Software Features
• Cisco NX-OS Release 8.2(1) Software Features
• Cisco NX-OS Release 8.1(1) Software Features
• Cisco NX-OS Release 8.0(1) Software Features

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


55
New and Enhanced Software Features

Cisco NX-OS Release 8.1(2) Software Features


Cisco NX-OS Release 8.1(2) does not have any new feature and this is a bug fix only release. Cisco
NX-OS Release 8.1(2) has the following scale enhancement:
• 250,000 OSPF link-state advertisement (LSA) support is provided.

Cisco NX-OS Release 8.2(1) Software Features


iCAM Monitoring

From Cisco NX-OS Release 8.2(1), you can configure the Intelligent CAM (iCAM) analytics and
machine-learning monitor interval and obtain the following traffic analytics on TCAM entries and
resources:
• Current, Historical, and Predictive Analytics for traffic per hardware table entry. For example, per
TCAM-entry traffic.
• Current, Historical and Predictive Analytics for hardware table utilization per feature.
• Top/Bottom X% hitters, sorting, filtering, based on traffic.
• Historical analytics provide history of traffic for a past date/time.
• Predictive traffic analytics provides traffic for a future date/time.
iCAM provides the above listed analytics for the following features:
• ACL, QoS, PBR, CoPP, WCCP, VACL, PACL, NAT, and so on about 32 features and combinations
of these features.
• Forwarding tables.
• Multicast tables.
GUI for iCAM is available in DCNM as an experimental feature (click on Monitor --> iCAM).

MKA

MACsec is a standard, which can be set up using Cisco security association (SA) protocol or MACsec
Key Agreement (MKA). The SA protocol was used to set up the MACsec standard prior to Cisco NX-OS
Release 8.2(1). MACsec can also use the MKA protocol in Cisco NX-OS Release 8.2(1) to exchange
session keys and manage encryption keys. MKA is supported only on physical ports and port channels.
MKA supports the following point-to-point use cases:
• Securing Data Center Interconnect (DCI)
• Securing Provider Edge (PE)-to-Customer Edge (CE) links in Multiprotocol Label Switching
(MPLS) network
• Securing PE-to-PE using dark fiber
• Securing CE-to-CE using an MPLS or Virtual Private LAN Services (VPLS) network
• MACSec on port channels
Using MKA, you can also secure a CE to multiple CEs using an MPLS or VPLS network, which is a
point-to-multi point deployment.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


56
New and Enhanced Software Features

Flexible ACL TCAM Bank Chaining

From Cisco NX-OS Release 8.2(1), the Flexible ACL TCAM Bank Chaining feature is supported on the
M2 Series modules.

DHCP Response Redirect

From Cisco NX-OS Release 8.2(1), you can use the ip dhcp redirect-response command on the DHCP
server-facing interface to redirect the packets to the correct switch. When you enable this command, the
relay agent on a border node includes source locater and VNI ID of the client segment as remote ID
option in request packets, and relays it to the DHCP server. When the DHCP server sends the OFFER
packets, the border node uses the information from the same remote ID option to create a VXLAN
header. This header includes the source locater set as the outer destination address and the VNI ID of the
client segment. This helps the border node to send the OFFER packet to the correct switch.

Slow Drain Enhancements for FCoE

The congestion drop timeout and pause frame timeout commands are modified for FCoE to align with
the commands used in Fibre Channel.
The following commands are modified:
• Congestion drop timeout command has changed from system default interface congestion timeout
milliseconds mode {core | edge} to system timeout fcoe congestion-drop {milliseconds | default}
mode {core | edge}.
• Pause frame timeout command has changed from system default interface pause timeout
milliseconds mode {core | edge} to system timeout fcoe pause-drop {milliseconds | default} mode
{core | edge}.

Connecting Data Center Fabrics with VXLAN BGP EVPN and OTV

This feature enables you to configure VXLAN and OTV on the same device (a single-box solution). The
VXLAN and OTV overlays are stitched together in the device, ensuring that the Layer-2 traffic between
the tunnels is within the bridge domain.

MPLS L3VPN DCI

VXLAN fabric supports external connectivity. Data centers in different sites can be connected using the
Data Center Interconnect (DCI) functionality. In the MPLS hand off scenario, the VXLAN encapped
packet is terminated and reoriginated to MPLS.

Configuring ACI WAN Interconnect

ACI WAN Interconnect feature is supported on M3 modules in Cisco NX-OS Release 8.2(1).

PBR support for the VXLAN BGP EVPN Fabric

Policy-based routing (PBR) support is provided for the VXLAN BGP EVPN fabric. PBR allows you to
configure a defined policy for IPv4 and IPv6 traffic flows, lessening the reliance on routes derived from
the routing protocols. All the packets received on an interface with policy-based routing enabled are
passed through enhanced packet filters or route maps. The route maps dictate the policy, determining the
destination to forward packets. PBR configurations have to be enabled on relevant ToR or leaf switches,
and spine switches in the VXLAN BGP EVPN fabric.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


57
New and Enhanced Software Features

Plug and Play

Network plug and play (PnP) is a software application that runs on a Cisco Nexus 7000 switch. The PnP
feature provides a simple, secure, unified, and integrated offering to ease new branch or campus
roll-outs, and for provisioning updates to an existing network. This feature provides a unified approach
to provision networks that comprise different devices with a near zero-touch deployment experience.

Consistency Checker Enhancements

Consistency checker compares the software state with the hardware state in a module and if there is any
inconsistency, it flags the issue immediately. This helps to reduce troubleshooting time at a later period.
The consistency checker enables users to perform basic troubleshooting and identify issues before
reaching out to support teams for resolution thereby reducing the mean time to resolve issues.
Except for Persistent Storage Service (PSS) consistency checker all other features are supported since
Cisco NX-OS Release 8.0(1) and are enhanced in Cisco NX-OS Release 8.2(1). Consistency checker is
supported on M3 and F3 modules. Users can execute the show consistency-checker all command to
perform consistency check for all components/features.
The following consistency checker components are supported in Cisco NX-OS Release 8.2(1):
• FabricPath
• Interface-properties
• Layer 2 Unicast and Multicast Tables
• L3-Interface Tables
• Link-State
• Proxy Forwarding
• Spanning-Tree
• Persistent Storage Service (PSS)

Distributed Packet Tracer

Distributed Packet Tracer (DPT) enables users to find and track specific traffic flow across all network
devices from a single-point server or network controller or network management system (NMS).
The DPT framework uses a central controller device (CCD) to communicate with an on-switch software
module called On-Switch-DPT. The CCD gets the input from the network administrator to trace a given
packet in a network. CCD then communicates this information to each of the switches in the network.
The On-Switch-DPT traces the packet and passes the information to CCD.
The CCD then collates all the information from various switches and analyzes them before presenting
the result to users.

Configure Replace

The Configure Replace (CR) feature enables a Nexus 7000 Series switch to replace the running
configuration with a user provided configuration without reloading. Device reload may be required only
when a configuration itself requires a reload. A user provided configuration is running configuration
taken from a Cisco NXOS switch. CR replaces the entire running configuration with new configuration
provided by a user. In case of failure in CR the original configuration is restored in the switch.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


58
New and Enhanced Software Features

Hardware Forwarding of IP Directed Broadcast Packets

From Cisco NX-OS Release 8.2(1), all Cisco Nexus 7000 Series I/O modules support hardware
forwarding of IP-directed broadcast packets. This feature is limited to the virtual device contexts (VDC)
on which this feature is applied. You cannot configure both software and hardware forwarding of
IP-directed broadcast packets on the same interface.

Layer 3 Routing over vPC

From Cisco NX-OS Release 8.2(1), Layer 3 routing over vPC is supported in the M3 Series I/O modules
for IPv6 unicast traffic.

IP TCP Maximum Segment Size

The IP TCP Maximum Segment Size (MSS) feature enables the configuration of a maximum segment
size for all TCP connections that originate from or are terminated in a Cisco Nexus 7000 Series switch.

Precision Time Protocol

From Cisco NX-OS Release 8.2(1), Precision Time Protocol (PTP) can be enabled in the M3 Series I/O
modules.

Catena

Catena works in transparent, routed, and mixed modes, which means each Catena instance can forward
traffic through a mix of Layer 2 and Layer 3 devices. Failover using probing is supported for traffic
redirection. Catena solution supports hash-based load balancing across appliances in the transparent
mode.
Data flow through these appliances is based on traffic type which is qualified by access control lists.
Each Catena service contains many chains of appliances, and each chain of appliance contains many
sequences of access-lists based on vlan-group, port-group, and device-group identifiers.

Subscription-based Licensing

From Cisco NX-OS Release 8.2(1), subscription-based licensing is available on Cisco Nexus 7000
Series switches. This enables the user to purchase licenses for any period of time.
From Cisco NX-OS Release 8.2(1), the Intelligent CAM Analytics and Machine-learning (iCAM)
feature is available under the ENHANCED_LAYER2_PKG license.

Virtual Private LAN Service

From Cisco NX-OS Release 8.2(1), all Virtual Private LAN Service (VPLS) functionalities, except
Ethernet Flow Points, (EFP), service instances and bridge domains, are supported in the M3 Series I/O
modules.

Ethernet over Multiprotocol Label Switching

From Cisco NX-OS Release 8.2(1), all Ethernet over Multiprotocol Label Switching (EoMPLS)
functionalities, except EFPs, service instances and bridge domains, are supported in the M3 Series I/O
modules.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


59
New and Enhanced Software Features

Private VLAN over OTV

From Cisco NX-OS Release 8.2(1), Cisco Nexus 7000 Series switches support Private VLAN (PVLAN)
that is extended over the Overlay Transport Virtualization (OTV) overlay. This allows a device to extend
Layer 2 VLANs across Layer 3 IP networks. Transmission occurs in a Layer2 frame attached to a Layer
3 header. In an OTV overlay, this feature allows two VLANs to communicate, based on the PVLAN
association.

Multicast only Fast Re-Route

From Cisco NX-OS Release 8.2(1), Cisco Nexus 7000 Series switches aim to achieve sub-sec
convergence delay for 16K (S, G) running on F3 and M3 Modules, using the Multicast only Fast
Re-Route (MoFRR) feature. This feature allows faster programming and improved convergence.

Web Cache Communication Protocol Support

From Cisco NX-OS Release 8.2(1) Web Cache Communication Protocol (WCCP) version 2 feature is
supported on bridge domain interfaces (BDIs) as an ingress feature.

Intelligent Traffic Director HTTP Probe

HTTP probes are supported to probe each node periodically to monitor their health.

Multicast VRF Route Leaking

With multicast extranet, the RPF lookup for multicast route in the receiver VRF can be carried out in a
source VRF, thereby allowing the return of a valid RPF interface. This forms a source or RP tree from
the receiver VRF to the source VRF, thus enabling the traffic originating from the source VRF to be
forwarded to the OIFs in the receiver VRF.

IPv6 Support

From Cisco NX-OS Release 8.2(1), you can configure peer-keepalive link using an IPv4 or IPv6 address.

ITD on M3

From Cisco NX-OS Release 8.2(1), Intelligent Traffic Director (ITD) is supported on M3 modules.

M3 support for LISP

From Cisco NX-OS Release 8.2(1), Locator/ID Separation Protocol (LISP) is supported on M3 modules.

ITD VIP Knob for Static Route

From Cisco NX-OS Release 8.2(1), the ITD VIP knob for static route feature allows you to configure a
Virtual IP Address (VIP) for ITD device group, with route creation based on the health of a device group
node. With a VIP knob, creation and deletion of routes is automatic and is triggered based on the health
of the ITD device group.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


60
New and Enhanced Software Features

Cisco NX-OS Release 8.1(1) Software Features


M3 FEX

From Cisco NX-OS Release 8.1(1), M3 Series modules are supported for FEX.

Disjoint Routing Locator (RLOC)

The Disjoint Routing Locator (RLOC) feature facilitates inter-fabric LISP traffic support by ensuring
that the LISP mapping system is aware of multiple fabrics. Each fabric is defined by a locator scope that
groups a range of RLOC (or fabric underlay) addresses that routers within the fabric are associated with.

L3 Over VPC for M3

From Cisco NX-OS release 8.1(1), routing over vPC for IPv4 unicast traffic is supported on the M3
Series modules.

M3 FabricPath

From Cisco NX-OS Release 8.1(1), FabricPath is supported on the M3 Series modules.

SGT Tagging Exemption for Layer 2 Protocols

From Cisco NX-OS release 8.1(1), you can exempt the Layer 2 (L2) control plane protocols from SGT
tagging when interlinking with ports.
This is to ensure that the packets from L2 control protocols are transmitted untagged from Ethernet peers
to ports.

Multi-hop BFD Support

The Bidirectional Forwarding Detection (BFD) Multi-hop feature enables detection of IPv4 network
failure between paths that are not directly connected. This feature also enables users to configure IPv4
BFD sessions over multi-hop routes.
If a BFD session is up (that is, the next-hop destination is reachable), IPv4 static routes that are
associated with IPv4 static BFD configuration are added to a routing table. If the BFD session is down,
the routing table removes all associated static routes from the routing table.
BFD notifies BGP when the path goes down. The path to reach the destination (BGP neighbor) is through
a static route only (with no IGP support).
The multi-hop BFD feature supports only the static routes in Cisco NX-OS release 8.1(1),

Cisco NX-OS Release 8.0(1) Software Features

VXLAN Fabric

MPLS L3VPN Hand Off Scenario in a VXLAN BGP EVPN Fabric

VXLAN BGP EVPN fabrics with a Cisco Nexus 7000 Series border leaf switch having an M3 module
can use the MPLS L3VPN network for WAN connectivity or for Layer-3 Data Center Interconnect.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


61
New and Enhanced Software Features

VXLAN OAM – Ping

The VXLAN OAM – Ping functionality is used to detect errors and path failures for traffic from a
leaf/ToR switch VTEP to an attached end host, to another leaf/ToR switch VTEP, or to an end host
attached to a VTEP.

VXLAN OAM – Traceroute/Pathtrace

VXLAN OAM – Traceroute/Pathtrace functionality is used for fault isolation in the VXLAN overlay.
Traceroute is an ICMP based solution that provides more information regarding the ingress and egress
interface paths. The traceroute command uses ICMP packets (channel-1) to trace the path the packet
traverses in the VXLAN BGP EVPN fabric overlay, and the pathtrace command traces the path the
packet traverses in the VXLAN overlay using the NVO3 channel (channel-2).

VXLAN OAM – Interface and Error Verification Statistics

This feature provides a provision to view interface and error verification statistics, when the pathtrace
function is used.

Pervasive Load Balancing (PLB)

Pervasive Load Balancing (PLB) is a fabric feature that provides Layer-3 and Layer-4 load balancing at
terabits speed without the need for any virtual or physical external load balancer equipment. Servers,
VMs and containers (specific to a given service) attached to different ToR/leaf switches might be
distributed across the fabric and this feature enables the switching fabric to load balance client-specific
service requests to these servers.
In this feature, the same virtual IP (VIP) is assigned to the group of servers that might be distributed
across the fabric. When different clients (local to the fabric or from a remote location) send requests for
a given service, these requests are destined to the VIP of these servers.
In the fabric, ToR/leaf switches matches these clients’ IP address bits/mask, the VIP and relevant
Layer3/Layer4 fields to load balance these requests among the servers.

VXLAN Support on the M3 Module

VXLAN support on the M3 module is added for the following features:


• IPv4/v6 unicast Layer-3 gateway
• Layer-2 Multicast
• M3 module as the Border Leaf switch
• OTV hand off on the M3 module (two box solution)
• Layer-2 CE hand off

Intelligent CAM Analytics and Machine-learning (iCAM)


Beginning with Cisco NX-OS Release 8.0.1, on the Cisco Nexus 7000/7700 Series Switches the
Intelligent CAM Analytics and Machine-learning (iCAM) feature is supported. The iCAM feature
enables you to view the traffic analytics per feature, Ternary Content-Addressable Memory (TCAM)
resources and entries. Prior to the introduction of iCAM feature, it was difficult to get an overall view
of how many TCAM/SRAM resource entries were used/free with various features and how much traffic
was flowing through the various subnets/applications.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


62
New and Enhanced Software Features

iCAM can be used to view historical TCAM data. iCAM analyses this historical data using machine
learning algorithms to predict TCAM usage and traffic stats at a future date and time.

Catena
This feature helps in chaining of devices so that packets are redirected through multiple devices. These
devices can be appliances like firewall, IPS, IDS and Load balancer, and so on. The devices are inserted
in the data path in such a way that there are no topological changes, or changes to existing configuration.
This feature can support scalability with many number of appliances in the data path.
Data flow through these appliances is based on traffic type which is qualified by access control lists.
Each Catena service contains many chains of appliances, and each chain of appliance contains many
sequences of access-lists based on vlan-group and port-group identifiers.

VPNv4 Multipath
The VPN Multipath Support for Inter-AS VPNs feature enables the switch to pick one path as the best
path and mark the other legitimate paths between Autonomous System Boundary Routers (ASBRs) as
multi path. This feature enables load sharing of traffic among the different multi paths and the best path
to reach the destination.

GIR Enhancements
A delay has been added before the after_maintenance snapshot is taken. A visible CLI indicator has been
added to display when the system is in the maintenance mode. Support for SNMP traps has been added
when the device moves from the maintenance mode to the normal mode and vice-versa through CLI
reload, or system reset.

X.509v3 Certificate-Based SSH Authentication


You can configure SSH authentication using X.509v3 certificates (RFC 6187). X.509v3 certificate-based
SSH authentication uses certificates combined with a smart card to enable two-factor authentication for
Cisco device access.

Flexible ACL TCAM bank chaining feature for M3


M3 Series modules support Flexible ACL TCAM bank chaining feature.

SGACL Policy Enforcement Per Interface


This feature provides support to enable or disable SGACL policy enforcement on L3 interfaces and L3
port-channels.

System Security Monitoring


System security monitoring functionality monitors and provides visibilities to the following system
related security technologies:
• XSPACE
• Address Space Layout Randomization (ASLR)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


63
New and Enhanced Software Features

• Object Size Checking (OSC)


• SafeC

Integrity Measurement Architecture (IMA)/Runtime Integrity


The Integrity Measurement Architecture (IMA)/Runtime Integrity feature provides assurance about
authenticity of Cisco NX-OS system and its components. This feature ensures that the system has not
been exposed to tampered code by measuring the Cisco NX-OS system and its components. You can
verify authenticity by comparing the measured value against a known standard value.

IPv6 First-Hop Security Features

IPv6 RA Guard

The IPv6 RA Guard feature provides support for allowing the network administrator to block or reject
unwanted or rogue router advertisement (RA) guard messages that arrive at the network device platform.

DHCPv6 Guard

The DHCPv6 Guard feature blocks reply and advertisement messages that come from unauthorized
DHCP servers and relay agents.

IPv6 Snooping

The IPv6 Snooping feature bundles several Layer 2 IPv6 first-hop security features, including IPv6
neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table
recovery, to provide security and scalability. IPv6 ND inspection operates at Layer 2, or between Layer
2 and Layer 3, to provide IPv6 functions with security and scalability.

SXPv4
Cisco TrustSec SXP version 4 (SXPv4) enhances the functionality of SXP by adding a loop detection
and prevention mechanism to prevent stale binding in the network. In addition, Cisco TrustSec with
SXPv4 supports SGT inline tagging, which allows propagation of SGT embedded in clear-text
(unencrypted) Ethernet packets.

SGACL Egress Policy Overwrite


The SGACLs downloaded by using Integrated Services Engine (ISE) and configured by using CLI can
co-exist. You can prioritize whether to use SGACLs downloaded from ISE or configured SGACLs by
using CLI. By default, the SGACLs configured by using CLI have higher priority in Cisco NX-OS.

Smart Licensing
Smart Licensing is a cloud-based approach to licensing. The solution simplifies the purchase,
deployment and management of Cisco software assets. Entitlements are purchased through your Cisco
account like Cisco Commerce Workspace (CCW) and immediately deposited into your Virtual Account

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


64
New and Enhanced Software Features

for usage. This eliminates the need to install license files on every device. Products that are smart
enabled communicate directly to Cisco to report consumption. The primary location to manage product
registration and monitor smart license consumption is the Cisco Smart Software Manager (CSSM).
License ownership and consumption are readily available to help make better purchase decision based
on consumption or other business needs.

vPC enhancements for Hitless vPC role change


The vPC hitless role change feature provides a framework to switch vPC roles between vPC peers
without impacting traffic flows. The vPC role swapping is done based on the role priority value of the
device under the vPC domain. A vPC peer device with lower role priority is selected as the primary vPC
device when the vpc role preempt command is executed.

BGP PIC Edge for IPv6


The BGP PIC Edge feature creates and stores a backup path in the routing information base (RIB) and
forwarding information base (FIB) so that when a failure on an eBGP link to SP is detected (the primary
path fails), the backup path can immediately take over, enabling fast fail over in the forwarding plane.
BGP PIC Edge feature supports both IPv4 and IPv6 address families.

Show Tech Binary Support


Binary tech support is a log-collecting framework that collects logs internally from all Cisco NX-OS
processes that are running on the device. Enter the show tech-support all binary <uri> command to
collect logs from across the entire device, including virtual device contexts (VDCs), and modules.
Binary tech support can either be parsed within the device or moved to an external log server where it
can be parsed off line. If a module fails during the log collection, binary tech support continues to collect
logs from all remaining modules and VDCs.

MTS Serviceability
The message and transaction service (MTS) is a high-performance interprocess communications (IPC)
message broker that specializes in high-availability semantics. MTS handles message routing and
queuing between services on and across modules and between supervisors. MTS facilitates the exchange
of messages such as event notification, synchronization, and message persistency between system
services and system components. MTS can maintain persistent messages and logged messages in queues
for access even after a service restart.
MTS provides extensive serviceability features. For instance, MTS provides notifications to inform an
application when its queue has reached a predefined limitation. Corresponding to each notification, a
default callback action is defined in MTS. From Cisco NX-OS Release 8.0(1), the System Message
Logging contains new logs that indicates the highest MTS memory users. These logs are set to severity
level 4. In addition, detailed memory usage stats with timestamps are collected per application. You can
use the command show sys int mts sup sap APP_SAP_NUM queue_stats to collect the technical
support, if an application contains an issue.

IPSLA IPv6
IPv6 support has been added for the ICMP Echo operations.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


65
New and Enhanced Software Features

Link OAM
Link OAM is supported only on F2+M3 modules. This feature allows service providers to monitor and
troubleshoot a single physical point-to-point Ethernet link. Service providers can monitor specific
events, take actions on events, and troubleshoot. Ethernet link OAM operates on a single, physical link
and it can be configured to monitor either side or both sides of that link.

Consistency Checker
Consistency checker is a tool that checks for system consistency, helps in root cause analysis and fault
isolation, checks for software versus hardware programming, and includes on demand trigger through
CLI.

Fault Management (Trigger Based Auto Capture of Logs and MTS Statistics Collection)
The Fault-Management System is used to enhance the Cisco NX-OS serviceability by providing an
efficient means to capture data relevant and adequate to debug issues being reported at the earliest
possible time, without any manual intervention.

EtherChannel Symmetric Hash for Ipv6


This feature enables fair distribution of traffic across all members of a port channel. This feature is
applicable to Cisco Nexus 7000 48-Port 1 and 10 Gigabit Ethernet F2-Series Modules and Cisco Nexus
7000 Enhanced F2-Series 48-Port Fiber 1 and 10 Gigabit Ethernet Modules only.

Enhancements to NX-API
Cisco NX-API allows HTTP-based programmatic access to the Cisco Nexus platform. NX-API extends
the capability of running CLIs for configuration management using HTTP/HTTPS. NX-API embeds the
commands into the body of XML, JSON or JSONRPC requests and executes them by spawning VSH
sessions.
The following enhancements have been made to NX-API:
• Configuration Validation—Allows you to validate the commands before applying them on the
switch. This feature will enable you to verify the consistency of a configuration.
– Validate-Only—Validates the configuration only; will not set the configuration.
– Validate-and-Set—Validates the configuration, if successful it applies the configuration on the
switch.
• Configuration Lock—Allows you to set an exclusive lock on the configuration; no other
management or programming agent will be able to modify the configuration if this lock is held.
• Checkpoint-Rollback—In case a CLI from a batch of configuration performed through NX-API
fails, you can ask for stop-on-error, continue-on-error or rollback-on-error while configuring.
– Stop-on-error—Stops on the first CLI that fails.
– Continue-on-error—Ignores and continues with other CLIs.
– Rollback-on-error—Rolls back to the previous state the system had before executing the
commands
• Command Live Reference—Displays the schema (i.e. the description of the keywords) for the CLIs
on NX-API Web Interface.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


66
New and Enhanced Software Features

• Generation of Java and JavaScript—Generates the Java code/JavaScript for each of the request
posted through the sandbox.

OTV Loopback Join Interface


The OTV Loopback Join Interface feature allows the overlay to use a loopback interface as the Join
Interface. This feature adds multicast based OTV control plane into the multicast core by using a
loopback as join interface. This also allows to have multiple physical uplinks into the provider multicast
core. This feature has the following enhancements:
• The existing otv join-interface configuration is expanded to allow for loopback x under overlay
mode.
• This feature is supported on M1, M2, M3, and F3 modules.
• This feature is supported on OTV GRE encapsulation (OTV 1.0) and UDP encapsulation (OTV 2.5).
• This feature supports multiple overlays on the same Loopback Interface (Multicast-based OTV
control-plane only).
The OTV Loopback Join Interface feature has the following limitations:
• There is no physical interface support as a join-interface when using Multicast-based OTV
control-plane.
• A OTV edge-device can not mix loopback and physical join-interface.
• Adjacency server configuration is not supported with the loopback join-interface.
• Only PIM ASM is supported for OTV Control-Group when using the Loopback Join Interface.
• Only PIM SMM is supported for OTV Control-Group when using the Loopback Join Interface.
• Bidirectional PIM is NOT supported when using the Loopback Join Interface.
• IP address of the loopback join-interface can not be set to the same IP as the AnyCast-Rp IP address.

ITD Enhancements
• The fail action bucket distribute and fail action mode least-bucket commands have been
introduced to specify how traffic is reassigned after a node failure.
• Added optimized addition or deletion of ACEs in include or exclude ACLs.

Scale Enhancements

MPLS Inter AS option B

• Cisco NX-OS Release 7.3(0)DX(1) and 7.3(1)D1(1) have support for Inter AS option B on M3
modules with 150,000 labels.
• When M2 and M3 are used in the same VDC, the supported scale in the VDC is 150,000.
• From Cisco NX-OS Release 8.0(1) onwards up to 500,000 routing entries are supported on the M3
modules for Inter AS Option B.
• Number of VRFs for hand off (MP-BGP) in a M3 module is 4000.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


67
MIBs

HSRP Multiple Group Optimization (MGO)

• On Cisco Nexus 7000 Series Switches with M3 modules, you can scale HSRP Multiple Group
Optimization (MGO) up to 8000 HSRP groups.
Note: You must create a custom control plane policing (CoPP) policy to change the Committed
Information Rate (CIR) to allow more control plane packets.
Change the u6route-mem command value for VDC from 64 to the default value of 24.
Refer to Cisco Nexus 7000 Series NX-OS Verified Scalability Guide for other Cisco NX-OS Release
8.0(1) scale enhancements.

MIBs
No new MIBs are added for Cisco NXOS Release 8.0(1) and for Cisco NXOS Release 8.1(1).

Licensing
Smart Licensing feature is introduced in Cisco NX-OS Release 8.0(1).
Smart Licensing is a cloud-based approach to licensing. The solution simplifies the purchase,
deployment and management of Cisco software assets.
Refer to the “Smart Licensing Chapter” in the Cisco NX-OS Licensing Guide. for more details on the
Smart Licensing feature.

For details on licensing information for earlier releases, see the “Licensing Cisco NX-OS Software
Features” chapter in the Cisco NX-OS Licensing Guide.

Caveats
The following topics provide a list of open and resolved caveats:
• Open Caveats—Cisco NX-OS Release 8.2(2)
• Open Caveats—Cisco NX-OS Release 8.1(2)
• Open Caveats—Cisco NX-OS Release 8.2(1)
• Open Caveats—Cisco NX-OS Release 8.1(1)
• Open Caveats—Cisco NX-OS Release 8.0(1)
• Resolved Caveats—Cisco NX-OS Release 8.1(2a)
• Resolved Caveats—Cisco NX-OS Release 8.1(2)
• Resolved Caveats—Cisco NX-OS Release 8.2(1)
• Resolved Caveats—Cisco NX-OS Release 8.1(1)
• Resolved Caveats—Cisco NX-OS Release 8.0(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


68
Caveats

Note Release note information is sometimes updated after the product Release Notes document is published.
Use the Cisco Bug Toolkit to see the most up-to-date release note information for any caveat listed in
this document.

Open Caveats—Cisco NX-OS Release 8.2(2)


Table 18 Cisco NX-OS Release 8.2(2) Open Caveats

Identifier Description
CSCvi76590 Hitting cts_core at dl_iterate_phdr () from /lib/libc.so
CSCvb67954 EVPN to LISP hand off on Nexus7K does not work in NX-OS 7.3
CSCvi27159 S-N LISP traffic from ACI POD to remote WAN router is dropped on M3
GOLF module
CSCvi56044 IPFIB cores with BGP shut/no shut after ISSU from NX-OS 7.3.2 to NX-OS
8.2.2

Open Caveats—Cisco NX-OS Release 8.1(2)


Table 19 Cisco NX-OS Release 8.1(2) Open Caveats

Identifier Description
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases

Open Caveats—Cisco NX-OS Release 8.2(1)


Table 20 Cisco NX-OS Release 8.2(1) Open Caveats

Identifier Description
CSCvf85676 XML validation failed for DRAP commands on BH
CSCvf86735 xml validation failing for OAM show event-log commands
CSCvf81432 Schema validity error for 'show monitor session all' command
CSCvg07184 iCAM : icam prediction resource acl_tcam not working when enabled on
multiple modules
CSCvf87719 peer-local and peer-vdc commands not being nvgen
CSCvf81406 DLC status is missing in xml schema for "show license status"
CSCvf81421 schema validation error for licensing clis
CSCvf66631 LC Reload on Bidir ends with Extra packets
CSCvg05917 N77/vPC/MFDM: 2-3 secs mcast drop 10 secs after “vpc role preempt”
CSCvf62853 aclqos crash on F3 and M3
CSCvf86826 show otv isis commands throwing an error for validate-xml

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


69
Caveats

Table 20 Cisco NX-OS Release 8.2(1) Open Caveats

Identifier Description
CSCvf99101 feature poap operation failed on response timeout from service which leads to
delay in POAP abort
CSCvf72890 ASCII-CFG-2-ACFG_OPER_FAIL: Ascii config/replay operation failed
because of Could not attach to clis
CSCvf85559 FP-ISIS validate-xml throwing an error for most of the option “Show
fabricpath isis”
CSCvf86400 kill lisp results in traffic loss
CSCvf84382 LISP cores at lisp_rt_send during de-configuration
CSCvf84373 LISP: lisp cores on cleaning up
CSCvf93507 nve oif removed after sso from S,G entry
CSCvg01021 VxLAN OTV: *,G has NULL OIF at the Leaf
CSCvf75002 Dont refresh type-5 LSA for which route is not present in RIB
CSCvf68532 ospf core at OSPF_IPC_MTS_THREAD post multiple process restarts
CSCvf28281 OSPFv2 area summarization does not happen after config-replace
CSCvf61367 SYSTEM UI:%URIB-3-NO_L3VM_INFO_ERROR message from sal client
CSCvf85079 banner motd" cmd stucks if it has message length more than 256.
CSCvf67914 KERN-2-SYSTEM_MSG: klm_sprom: sys_srv_register_multiple FAILED
(rc=-1)
CSCvg06181 Delayed VPC SVI bringup upon reload or MCT flap in scale environment
(900+ SVIs)
CSCvf85702 xml validation failed for some u2rib commands
CSCvf81873 killing netstack process deleting nve peers
CSCvf89452 Vxlan Fnl UI, traffic loss after completion of ISSU from 7.3.1 to 8.2(.23)
CSCvg09282 M3: Some layer2 tunneled multicast traffic getting mis-forwarded under
scaled condition
CSCvf72413 SDA::DHCP Server (shared across SDA and traditional) & Traditional DHCP
shouldn't be in same instance
CSCvg13589 source background script exits if its parent session is closed causing VOAP to
fail
CSCvf81747 M3: QSA (40G to 10G):SFP checksum error on inserting 40G-SR after
CVR-QSFP-SFP10G.

Open Caveats—Cisco NX-OS Release 8.1(1)


Table 21 Cisco NX-OS Release 8.1(1) Open Caveats

Identifier Description
CSCvc72202 CVR-QSFP-SFP10G goes down after the F3 module reload
CSCve98530 SYSTEM UI: xbar core during ISSU from 732 to 811

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


70
Caveats

Table 21 Cisco NX-OS Release 8.1(1) Open Caveats

Identifier Description
CSCve98991 Packet drop during ISSU from release 7.3(x) release to 8.1(1)
CSCve18373 "show accounting log last-index " returns the incorrect value
CSCve18413 "show accounting log start-seqnum <seq num>" seems to be broken in 8.1(1)
CSCve06320 Netflow - msg stuck in MTS Buffer after ISSU
CSCve13677 N7K: M3 module crash in ncpinfraclnt service on IPv6 FIB update
CSCve07736 N7K Fabricpath - MAC address not re learnt on GARP
CSCvd48720 FCoE-ST: Tail drop seen on 10G F2E N77 FPC with 2348UPQ
CSCve16857 OSPF will change its router-id live without the process restarting in 7.3(1)D1(1)
CSCve19058 HMM does not restore hosts on cold boot from 7.2.2 to 8.1.1
CSCve15020 HMM SOO mode was not set right
CSCvc66384 MHBFD-ES: MH BFD sessions remain down on m2-m3 vdc if the sessions on
hosted on m3 lc
CSCvd41537 N7K - SNMP ciscoSwitchStatsMIB not populated
CSCve03125 Seeing duplicate packets after converting from vpc to vpc+
CSCvd81058 N77/PIM: Mcast duplication for local groups upon restoring peer-link
CSCve15198 multicast traffic failing after remove/add feature lisp
CSCve13327 MVPN Mcast block-hole after Core router reload (ASR9K)
CSCvd94102 Add of F3 as a SITE facing i/f triggers broadcast/Selective flood mac traffic drop
CSCvd52055 N77/MVPN: Mcast duplication upon P SSO
CSCvc91124 Issue with post migration of peer-link from M1 to M2
CSCvc50850 On a full scale EIGRP setup, nbrs flap with hold timer expiry
CSCvd98154 ACL is removed from SVI but remains programmed
CSCvc03136 BGP PIC convergence delays when a large number of interfaces are brought down
CSCve01811 vpc-config-sync fails with error message
CSCve05847 VRRPv3 crash in looped topology
CSCvd97431 stats not shown for violate class when run with per-inst option
CSCve22833 Increase memory usage running EEM+Python script and hang those with high
CPU usage after a few days.
CSCve02818 All multicast traffic dropped after vdc suspend/switchover/vdc resume.

Open Caveats—Cisco NX-OS Release 8.0(1)


Table 22 Cisco NX-OS Release 8.0(1) Open Caveats

Identifier Description
CSCvc72202 CVR-QSFP-SFP10G goes down after the F3 module reload
CSCvc34234 Large delay in getting new TLVs after ISSU in vPC causing BDs to go down.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


71
Caveats

Table 22 Cisco NX-OS Release 8.0(1) Open Caveats

Identifier Description
CSCvc59235 ARP Request packet reaching via VXLAN tunnel on a VPC leg is not being
forwarded to the VPC leg.
CSCvb86018 ACL: netflow PACL mac classify combo , traffic drop observed
CSCvc56810 Observing EPLD upgrade failed on N7718 Chassis during installation of FANs.
CSCvb93439 Host key verification failed,
CSCva65433 L2 FP BFD sessions not coming on M3 LC
CSCtx63124 bfd core in bfd_disc_node_comp_func
CSCvc34248 Memory leak in RTD monitor when getting ASLR info
CSCvc25628 Error after cold boot from 7.3.0.Dx to .8.0.
CSCvc37897 Per-if SGACL bypass feature does not work with Any-Any DENY rbacl
CSCvc32868 Switch not coming up with fabricpath license after licensing mode switch
CSCvb30907 static-host encap value displayed zero
CSCvc41428 icam does not account 2 entries for ipv6 for F3 and M3 modules
CSCvc13112 l2vpn traffic drop for EFP interfaces post ISSU from 730DX -> 8.0.0.26.S3
CSCvc42877 MPLS Scale testbed ISSU from 8.0.0.71.bin.S4 to upgrade of a module failed
CSCvb95831 Loopback OTV Overlay: OTV ISIS Adj flap on switchover
CSCvb66956 ipv6 mroute oif shows ? instead of interface
CSCvb52410 OTV loopback ASM to BiDir mode change causes Flood traffic loop
CSCvc38109 startup route for SG on reloading module
CSCvc23468 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP November 2016
CSCvc43192 "show tech-support services" unavailable in RISE only VDC
CSCvc32767 xbar_client process restart and switchover results in sup to lc traffic drop
CSCvc25599 F3: port_client Crash
CSCvc49851 MST instance configurations delayd to get synced or failed
CSCvc29233 validate-xml of sh ipv6 snoop policy and counters fail with some special
sub-options set
CSCvc28523 Configuration update aborted with invalid ip address configured
CSCvc42685 M3-F3 SGT (CMD Tag) Exemption For L2 Control Protocol

Resolved Caveats—Cisco NX-OS Release 8.2(2)


Table 23 Cisco NX-OS Release 8.2(2) Closed Caveats

Identifier Description
CSCuw40711 Nexus - in.dcos-telnetd service crash
CSCuw86555 ENH - N7K Silent/Unknown supervisor switchover
CSCux87740 N7K uses wrong MAC address for BFD when peer switches mac address

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


72
Caveats

Table 23 Cisco NX-OS Release 8.2(2) Closed Caveats

Identifier Description
CSCva20758 ISSU - TSH Gdb to upg Gdb Lead to SNMP Crash on MDS 9513
CSCvc69075 MAC address mismatch between SUP and LC after a VPLS failover.
CSCve01811 vpc-config-sync fails with error message
CSCve78301 N7k-PI: bps rate is incorrect under type qos policy-map
CSCve80468 N7K/F2e/F3:Post Routed L3 MCast traffic forwarded on both the FTAG
CSCvf27235 N7K: Improve Logging for Interrupt Fault
CLP_LBD_INT_MEM_ECC_PORT_MAP_TBL_ECC_1ERR
CSCvf36683 N7K-SUP2/E: eUSB Flash Failure or Unable to Save Configuration
CSCvf58207 vPC+ Secondary does not suspend SVIs when Primary reachable via
Fabricpath
CSCvf59067 N7k-8.X- Eigrp SIA due to a query/update from non successor.
CSCvf66024 PBR programming wrong adj index when N7K up with multiple PBR
configured ports
CSCvf75002 Don’t refresh type-5 LSA for which route is not present in RIB
CSCvf77200 n7k/l2vpn: FLUSH not requested upon DOWN->UP change
CSCvf79160 OSPF type-5 routes blocked from RIB when table-map with permit route-map
is applied
CSCvf87011 M3 - Ncpinfraclnt Crash
CSCvg03991 M3 linecard is parsing the Mobile IPv6 header incorrectly and assigning a
drop interface index
CSCvg04072 Cisco NX-OS System Software Patch Installation Command Injection
Vulnerability
CSCvg04455 N7K - RewriteEngineLoopback test failure does not error disable ports in
non-default VDC
CSCvg10842 Input discards after issu to 7.3 or 8.x code, egress throughput reduction for
F3-100gig/40gig ports.
CSCvg11502 Entering encapsulation mpls sub-menu and then exit in n7700 makes
pseudowire to go down
CSCvg17452 Nexus 7k router drops packets at VXLAN encap due to incorrect egress LIF
programming
CSCvg23522 Unable to remove the ACL from N7k
CSCvg24686 SNMP v3 information leaking vulnerability
CSCvg25737 URIB sends route notifications for broadcast routes when the client requests
all-igp notifications
CSCvg27491 F3 module goes HW faulty when using 1Gb Transceiver
CSCvg32741 HA policy URIB crash@urib_ext_comm_on_rte_nib on 8.2.1 release
CSCvg34717 Multicast CP packets are dropped by F2/F3 module
CSCvg44947 Dropping GTP ipv6 packet
CSCvg45324 Static mac programmed as dynamic for orphan mac

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


73
Caveats

Table 23 Cisco NX-OS Release 8.2(2) Closed Caveats

Identifier Description
CSCvg46045 post ISSU from 7.2.2 to 7.3.2.D1.2, on collector, the flow record templates
show junk values
CSCvg50660 Need Syslog when DHCP SAP has high MTS Queue Size
CSCvg61970 Tacacs Daemon process crashes due to AAA timeouts
CSCvg67835 IPSLA:sla responder memused reaching memlimit - memory not deallocated
CSCvg68573 N7K/F2 - EG recovery improvements
CSCvg70469 Drop MTS messages when DHCP SAP MTS Queue full.
CSCvg70868 Nexus 7k Sees "ipfib" Crash on N77-F348XP-23 Linecard
CSCvg92062 Post ISSU from 7.3.1 to 8.1.2 image, record templates show junk values
CSCvh02948 After VDC reloaded native vlan mapping to VNI mismatch cause traffic
disruptive
CSCvh04206 Nexus 7000/7700 | 8.2(1) | Unicast broken with wccp enabled
CSCvh05330 M3-Fex: VSH crash on M3 module Tech support
CSCvh23286 cmd_exec_error when executing show tech eigrp through python interpreter
CSCvh30932 IP access list corruption after NX-OS upgrade
CSCvh32898 VRF leaking in SDA: EVPN paths' parent ECMP doesn't update on RIT moves
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases
CSCvh65347 LDI collision seen after sup switchover
CSCvh69235 N77 VRF stuck in 'Delete Holddown' after being deleted
CSCvh87165 Don’t set mpls-vpn flag in URIB for ipv4 LU to VRF leak
CSCvh87462 M3: Mipv6 packet dropping
CSCvh87828 lisp punt route nexthop not deleted/updated for all interfaces/routes after BGP
nexthop change
CSCvi10829 var/tmp 100% full on M3 linecards due to mfib_log.txt
CSCvi11059 F2 linecard goes into a booting loop when more than 200 "vpc orphan-port
suspend" are configured.
CSCvi12277 FEX power supply, fan not populated in entPhysicalTable on N7k for version
8.2(1)
CSCvi34997 N7K - XML sub agent initialization fails: xml session creation failed. Out of
memory.
CSCuz92063 Two paths created from BGP peer even w/o add-path cap exchanged + bgp
cores @ bgp_brib_destroy_path.
CSCvh89092 N7K - adding kernel nvram-messages to show tech.
CSCvg38672 vpc self-isolation: vpc legs are up on local after all modules up when MCT
down.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


74
Caveats

Resolved Caveats—Cisco NX-OS Release 8.1(2a)


Table 24 Cisco NX-OS Release 8.1(2a) Closed Caveats

Identifier Description
CSCvh62554 HSRP VIP is not reachable from Standby after ISSU between 8.x releases.
CSCvh14951 IPv6 traffic flow blocked.
CSCvi23370 HSRP VIP resolved on stand-by is missing after SSO.
CSCvi28057 812a DCNM Failure: POAP Script execution failed.

Resolved Caveats—Cisco NX-OS Release 8.1(2)


Table 25 Cisco NX-OS Release 8.1(2) Closed Caveats

Identifier Description
CSCuw40711 Nexus - in.dcos-telnetd service crash
CSCuw86555 ENH - N7K Silent/Unknown supervisor switchover
CSCvb74706 N7K: F3 2s convergence time on module OIR
CSCvb86787 Cisco Nexus 5K/6K/7K/9K/9500-R/MDS CLI Command Injection
Vulnerability
CSCvb93995 Cisco NX-OS Software removes ACL from VTY interface
CSCvc44015 address-family ipv4 multicast path invalid in BGP but present in URIB
CSCvc56655 Nexus 7k itd NAT destination issue
CSCvc69555 Evaluation of N3K/N3500/N5K/N7K/N9K/MDS for OpenSSH vulnerability
CVE-2016-10010
CSCvc71792 implement a knob to allow weak ciphers
CSCvd10140 Dynamic Mac address has wrong DI (Destination index) on M2
CSCvd72172 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP March 2017
CSCvd74225 N7K/F3: Constant EOBC heartbeat failure
CSCve01811 vpc-config-sync fails with error message
CSCve06320 Netflow - netflow/nfm not responding msg stuck in MTS Buffer
CSCve07101 N7k/6.2(16) BGP not prepending as-path for certain prefixes in a prefix-list
CSCve12380 CTS commands unavailable if medium p2p configured on a port channel
CSCve34578 Nexus 7000: cts hap reset on 7.3(1)D1(1) triggered when ASA failover
happens
CSCve40271 N7K crashes while opening startup-config
CSCve46211 ethpcm crash when trying to allocate memory
CSCve47401 N3K/N9K/N7K OSPF Rogue LSA with maximum sequence number
vulnerability
CSCve51700 Cisco FX-OS and NX-OS System Software CLI Command Injection
Vulnerability

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


75
Caveats

Table 25 Cisco NX-OS Release 8.1(2) Closed Caveats

Identifier Description
CSCve54480 ARP ACL not working on M3 card
CSCve54860 im_get_ifindex failure when creating some port-channel subinterfaces
CSCve61829 Unable to access startup config though copy run start succeeds
CSCve65582 config session pushing acls is causing fsm timeout and
CSCve66517 Memleak in URIB_SHMEM_TLV_PTR (show routing ip unicast internal
mem-stats shared detail)
CSCve70348 MHBFD:HSRP vMAC being used by standby once during priority change so
MH BFD sessions are flapping
CSCve78301 N7k-PI: bps rate is incorrect under type qos policy-map
CSCve78734 FHRP hello packet does not TX L3 interface
CSCve80218 ULIB process corrupted, producing route leakage between VRFs
CSCve87784 BGP Process Crash when receivng AS Path longer than 255
CSCve93651 Broken VRF Due to RD Change in BGP
CSCve99902 Cisco Nexus Series Switches CLI Command Injection Vulnerability
CSCve99925 Cisco NX-OS System Software CLI Command Injection Vulnerability
CSCvf18050 FEX: routed sub-interface stop forwarding post fex-fabric uplink reload
CSCvf29432 Cisco Nexus 7000 Series Switches Privilege Escalation via sudo
CSCvf31132 Cisco NX-OS System Software Management Interface Denial of Service
Vulnerability
CSCvf33147 F3 - xbar sync failed during module bringup after upgrade N77-F312CF-26
ver 1.1
CSCvf58207 vPC+ Secondary does not suspend SVIs when Primary reachable via
Fabricpath
CSCvf66000 static ARP might point to wrong physical interface
CSCvf66024 PBR programming wrong adj index when N7K up with multiple PBR
configured ports
CSCvf73007 Access list is failing for SNMPv3 in N7k
CSCvf77200 n7k/l2vpn: FLUSH not requested upon DOWN->UP change
CSCvf77327 ARP Performance Improvement when ARP suppression is enabled
CSCvf87011 M3 - Ncpinfraclnt Crash
CSCvg04072 Cisco NX-OS System Software Patch Installation Command Injection
Vulnerability
CSCvg04455 N7K - RewriteEngineLoopback test failure does not error disable ports in
non-default VDC
CSCvg10842 Input discards after issu to 7.3 or 8.x code, egress throughput reduction for
F3-100gig/40gig ports.
CSCvg11502 Entering encapsulation mpls sub-menu and then exit in n7700 makes
pseudowire to go down

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


76
Caveats

Table 25 Cisco NX-OS Release 8.1(2) Closed Caveats

Identifier Description
CSCvg17452 Nexus 7k GOLF router drops packets at VXLAN encap due to incorrect egress
LIF programming
CSCvg24686 SNMP v3 information leaking vulnerability
CSCvg27491 F3 module goes HW faulty when using 1Gb Transceiver
CSCvg34717 Multicast CP packets are dropped by F2/F3 module
CSCvg44947 Dropping GTP ipv6 packet
CSCvg45324 Static mac programmed as dynamic for orphan mac
CSCvg46045 Post ISSU from 7.2.2 to 7.3.2.D1.2, on collector, the flow record templates
show junk values
CSCvg50660 Need Syslog when DHCP SAP has high MTS Queue Size
CSCvf36683 N7K-SUP2/E: eUSB Flash Failure or Unable to Save Configuration

Resolved Caveats—Cisco NX-OS Release 8.2(1)


Table 26 Cisco NX-OS Release 8.2(1) Closed Caveats

Identifier Description
CSCvg10045 Vxlan fnL UI - ipfib core during ISSU from 8.1.1 to 8.2.1
CSCvf94693 8.2.1:- memory leak for ARP process
CSCvf81424 sh ip arp statistics | validate-xml shows "The output is invalid"
CSCvf83621 show ip arp suppression-cache <summary> | <statistics> shows "output is
valid"
CSCvf51507 BFD neighborship does not come up with OTV site-vlan as bd
CSCvf35516 BFD session doesn't come up if the interface is configured with RACL in
flexible bank chaining mode
CSCvf55349 m2 flexible bank chaining configs/feature is not getting removed while
moving from 8.2.1 to 8.1.1
CSCvf17859 MKA interfaces may error disable on module reload with more than 48 P2P
sessions
CSCvf85857 Bridge-domain L2vpn vfi context not deleting after no bridge-domain <id>
CSCvf00967 MTU on int pseudowire configured, but not effective
CSCve90065 system switchover and LC reload, Xconnect session not come up
CSCvf77032 Few SH BFD sessions are flapping on ISSU with MH + SH BFD (echo
disabled)
CSCvf42053 F3 Phy vPCs - Post fabric port-channel flap, it takes 3 mins for multicast traffic
to converge
CSCvf85636 show ip igmp some option throwing an error for validate-xml option
CSCva19035 "match ipv6 multicast group-range" option not working
CSCvf66675 %PIM6-3-RWSEM_LOCK_FAIL traceback seen after VDC reload

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


77
Caveats

Table 26 Cisco NX-OS Release 8.2(1) Closed Caveats

Identifier Description
CSCvf92758 8.2.1 S9 - Xml validation is failing for "show ip pim rp" cmd
CSCvf85600 cmd_path_get: invalid attribute index 1 component 119 for "show ip pim route
| validate-xml"
CSCvf15194 ip pim state limit doesn't take effect with vrf leak
CSCvf16704 LHR takes 9 min to get converged with 2000 routes on 10 vrf
CSCvf85662 show ip mroute detail is throwing an error for validate-xml
CSCvg08603 show ip static-route multicast output not xmlised
CSCvf04475 N77/MVPN: 3 minutes mcast duplication upon PE-P link flap
CSCvf04251 N77/MVPN: unexpected mcast duplication upon reloading and restoring P
router
CSCvf86088 validate-xml fails for "sh otv isis route"
CSCve84229 MKPDU is detected as "Unknown type" in ethanalyzer
CSCvf62523 Routes are stuck in RIB cleanup process due RD is down for some VRF's
CSCvf84063 lisp core on duplicate detection of multiple hosts
CSCve07881 configure replace Fails when trying to do no interface overlay 1000.
CSCvf92504 CR: IPSLA probes modification fails with DEL DB contents and with syntax
error for vrf context
CSCux36446 SSTE: Vinci/Leaf: DAEMON-2-SYSTEM_MSG: fatal: login_init_entry
CSCvf80232 QSA (40G to 10G): Link comes up after multiple flaps on OIR of SFP
CSCvf85238 QSA optic: Link is up in remote side while Link is in not connected state in
local
CSCve62904 CR failed with ERROR: 1 or more interfaces are from a module of type not
supported by this vdc
CSCvg10842 Input discards after ISSU to Cisco NXOS 7.3 or 8.x release, egress throughput
reduction for F3-100gig/40gig ports.

Resolved Caveats—Cisco NX-OS Release 8.1(1)


Table 27 Cisco NX-OS Release 8.1(1) Closed Caveats

Identifier Description
CSCvb17981 CTS CoA ACK not sent via ip radius source-interface
CSCvc55250 RADIUS CoA ACK sent with incorrect authenticator
CSCvc46038 After Adjmgr stateful restart messages held
CSCur64880 bfd session flap after enabling BFD echo-interface on Loopback1 int
CSCvd85372 MHBFD: All MH BFD sessions flap once on rehosting via LC reload
CSCve12380 CTS commands unavailable if medium p2p configured on a port channel

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


78
Caveats

Table 27 Cisco NX-OS Release 8.1(1) Closed Caveats

Identifier Description
CSCvd08898 Hash-algorithm HMAC-SHA-1 can't be configured on F3 linecards, after
upgrading to 7.3.x
CSCvd48792 Processes should clear /var/tmp logs periodically
CSCvd51905 M3-M2 RFC2544 72 L2U port full-mesh throughput test - frame loss
CSCvd56803 M3-M2 10G Performance Issue with 256 Frame Size
CSCvd25258 Bogus DHCP GIADDR being used for DHCP Smart Relay post ISSU
CSCuy29923 Event manager configuration is out of order in start-up configuration
CSCvb28656 Puts sends output to syslog, not the controlling terminal
CSCvd38589 Empty field is seen and Mac's are not secured in Avalon image
CSCvd58766 N7k:Monitor port has VLAN membership although no config present
CSCvc78278 NXOS/ETHPM: Traffic not forwarded after port change from Channeling to
Individual
CSCvd29188 Eb drop counter is showing stats doubled the real eb drops
CSCvd16811 M3 IntLoopback is not running on link down and XCVR not inserted ports
CSCvd53833 N7K: "IFTMC PD commit db search failed" error msg post ISSU to 7.2
CSCvd16210 Incorrect output structure for commands related to per vrf configuration.
CSCvc69075 MAC address mismatch between SUP and LC after a VPLS failover.
CSCvb64844 N7k/vPC+ - L2 loop cause FP core Port not copy CE MAC address
CSCvd40018 BFD packets leaving LC CPU have a vlan id of 0 when egress lookup on
flanker
CSCvd70168 N77/MVPN: Mcast duplication upon clear ip route * on PE node
CSCvc62084 STP BA Inconsistent on port-channel interface when native vlan does not exist
CSCvc67913 Error: AAA authorization failed for command:show version,
AAA_AUTHOR_STATUS_METHOD=16(0x10)
CSCvc42886 No SSH possible to device when root directory is full due to nxapi request
CSCvb84735 NTP sync issue with ntp distribute upon image upgrade due to incorrect vrf id
CSCvc90796 Sync with NTP servers lost intermittently
CSCvd88316 Return value is incorrect for object-tracking configuration - VTS config push
will fail
CSCvc65466 OTV fails to advertise mac after a mac move
CSCvc95126 High CPU caused by VSH after show tech-support issued
CSCvc04030 Setting terminal password breaks sftp/scp transfer operation on N7K
CSCvd37212 M3 vPC Scale: VSH cored after add/remove "feature vpc" and its related
configurations
CSCvd17129 RBH mis programmed after removing interfaces from vpc and reusing the
interface as standalone port
CSCvb93865 Nexus77: routing failover time increased 1sec after version up from 6.2(14) to
7.3(1)D1(1)

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


79
Caveats

Table 27 Cisco NX-OS Release 8.1(1) Closed Caveats

Identifier Description
CSCvb10344 ISSU add "port-channel load-balance src-dst ip type invalid fex all" cfg
CSCvc32466 Autoconfig for DCI: VRF stuck on box after reload and add/remove triggers
CSCvc46743 N7k: Traffic from pvlan hosts blackholed when pinging primary SVI
CSCvc54555 F3: DTAG TTL 1 packets have to be rate-limited
CSCvc09777 %SYSMGR-2-VOLATILE_DB_FULL: System volatile database usage is
unexpectedly high at 81%.
CSCvd86332 EIGRP routers stopped propagating default route.
CSCvd04835 Old connected route is not removed from EIGRP topology table
CSCvc81179 Nexus7k ISIS crash at txlist_tq_remove_node
CSCvc51500 LISP hand off on Nexus7K does not work in NX-OS 7.3
CSCve20025 LISP crash during vdc reload
CSCvc91548 Incorrect forwarding address is set to OSPF type-5 LSA of summarized route
CSCvc30847 OSPF LSA not withdrawn from Nexus when interface is down
CSCvd08029 SNMPD crash when RIPv2 authentication is enabled and
RIPv2-MIB::rip2IfConfAuthType is being polled
CSCvc56655 Nexus 7k itd NAT destination issue
CSCvd78869 N7K10G: SMARTC crashed when ISSU from 7.3.0 to 8.1.1
CSCvb32808 statsprofiler crash with no space in sap STATSPROFILER SAP
CSCvd19647 FEX HIF VPC has STP port-type edge and bpduguard disabled on VPC
secondary
CSCvb48317 N7K: Some static routes set BFD remain after disabled I/O module though
BFD states have been down.
CSCvd40091 F3 FEX Scale: SNMP MIB WALK errored out "Reason: resourceUnavailable"
CSCvb65414 logging server vrf goes unknown after switchover
CSCvc57098 Syslog MTS recv_q buffer filling up when "logging source-interface"
configured
CSCvd23076 TACACS crashes when buffer limit (>2072) is crossed for valid command
arguments
CSCvd64752 Nexus Switch Booting In Fabricpath Mode Transit Needs To Send Notification
CSCvc46028 On N7k UDLD does not work interface is configured as promiscuous.
CSCvd74634 UFDM does not download route to line card after ISSU SMU
CSCvd77099 Load sharing is not happening for OTV UDP encap traffic on F3 or M3 cards
CSCvc49851 MST instance configurations delayd to get synced or failed
CSCvb93352 N7K - Loops VTP v3 update on peer-link between vPC peers
CSCvc55528 WCCP crashed due to memory leak - WCCP_MEM_msg_control_packet
CSCvb46891 N7K CoPP: Require stats per forwarding engine for all module types
CSCvd44475 Multicast traffic loss during FP switch id change
CSCvd17080 Need to sym-link /usr/bin/python to /isan/bin/python

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


80
Caveats

Table 27 Cisco NX-OS Release 8.1(1) Closed Caveats

Identifier Description
CSCvb86602 % Next-hop cannot be local address in same or different vrf
CSCvg10842 Input discards after ISSU to Cisco NXOS 7.3 or 8.x release, egress throughput
reduction for F3-100gig/40gig ports.

Resolved Caveats—Cisco NX-OS Release 8.0(1)


Table 28 Cisco NX-OS Release 8.0(1) Closed Caveats
Identifier Description
CSCvb84395 CTS: M3 module failure with log enabled deny policies
CSCvc07445 RISE ISCM CLIs changed to SC_ENGINE
CSCuz60225 Special Characters are not handled by NXAPI
CSCuz82684 aclqos crash on large acl with scale object groups
CSCuw03713 N7K: Layer 2 (L2) packet not dropped on length mismatch
CSCvb40562 N7K: F3 module crash in ncpinfraclnt service during FIB update
CSCvc10229 ISSU to 801 should be blocked if RISE feature is configured
CSCvb95725 AdjMgr crash during stress from ARP
CSCux97309 SSTE: [Longevity2] CFS MTS buffer leak
CSCva84959 F2 1G port fails to recover after remote end comes back up
CSCuy02586 vPC+ both switches learn mac address on peer-link on receiving garp
CSCuz10518 Nexus got dot1x hap reset
CSCut94161 EEM: Configuration failed with: 0x412c000d validation timed out
CSCvb14045 DNL bit cleared on Port-Security port-channel after member into initial
CSCuf47376 Trunk/FEX FPC port config removed by "system def switchport fabricpath"
CSCva16707 F3 - static MAC programmed for TCAM Bucket0
CSCva66159 debounce timer not honored for 1G/SGMII mode on 10/1 F3 module
CSCva63984 F3: Port stuck in 10G mode when QSFP w/ breakout is removed before conf
CSCuy82996 N7k F3 40gig fex fabric links flap continuously to FEX 2348UPQ
CSCvb23556 MDSNG : callhome crashed sig6 while replaying configs
CSCuu64415 hmm crash after removing vlan on peer link from suspended
CSCva94583 FP: Anycast HSRP stuck in Init state after VDC reload
CSCvb39993 n7k/hsrp anycast: incorrect active hold timer after timer config change
CSCva16041 N7K: HSRP holdtimer doesn't reset when receiving HSRP hello
CSCva24715 Nexus Anycast HSRP crashes when VLAN string is more than 1000
CSCva74462 N7K w/ Sup 2 Engine Incorrectly Punts MPLS Traffic to Control Plane
CSCvb26949 DFA auto-config profile refresh failure due to IPv6 address change
CSCvb27539 Nexus 7004 6.2.14 IPv6 connected L3 interface not showing up in RIB

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


81
Caveats

Identifier Description
CSCus83776 ITD: Can't advertise the route for VIP
CSCva11756 vPC+: Wrong ESDB info due to changing port-channels having VPC's
CSCva13788 post ISSU, bfdc crashed due session data structure corruption
CSCuz75979 N7k interface counters are not being updated.
CSCvb12189 SNMP Timeout Requesting lldpRemManAddrOID on Certain Interfaces
CSCvb30818 IGMP Snooping Mrouter port state is not synced during bootup in VPC
CSCvb61043 vPC Auto-recovery doesnt kick-in after reload with keep-alive down
CSCuz53597 N7K does not advertise implicit-null label as an Edge-LSR should do
CSCvb31890 Tracebacks on MPLS TE
CSCuy62745 Master Bug to port fix for 2348 Issues from N5k to N7k,N9k
CSCuy14606 enhance system internal mem for sysmgr @ LC level
CSCuu15632 Invalid PI error, configuring static nat without carving Tcam for NAT
CSCuy04933 Wrong timestamps in netflow data
CSCva81638 N7K Netflow F3/M3: Rate limiter default value incorrectly programmed
CSCvb17413 Unable to access NXAPI Sandbox(Non-default VDC) as VDC-Admin
CSCuz44147 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP April 2016 CVEs
CSCux95101 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP January 2016 CVEs
CSCuz92661 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP June 2016 CVEs
CSCuw84708 Evaluation of N9k/N7k/N5k/N3k/MDS for NTP October 2015 CVEs
CSCvb02494 N7K OTV with BFD configured / BFD Session Flaps on System Switchover
CSCuh22289 N7k Enh: "terminal log-all" functionality should be default
CSCva25803 NX-OS route-map fails to parse v4-mapped IPv6 address
CSCuz98928 NX-OS: pipe not recognized as special character by 'exclude' cli filter
CSCvb31113 N7K PTP Process crash with NULL pointer mts_wrap_p
CSCva61554 aclqos crash due to port configuration default dscp one-to-one mapping
CSCvb49085 n7k M3: Shaping policy causes interfaces to go to suspended state and
IntPortloopback to fail
CSCux77223 bestpath run in vrf - route gets deleted
CSCvb44776 BGP crashes due heartbeat failure after asserts
CSCvb14569 frequent no rd and rd config can get vrf stuck in down state
CSCva79760 IPV6 link local only BGP peering leads to installing wrong adjcaency
CSCuu06829 SUP switchover causes duplicate connection on switchover device
CSCuy07502 In show running, ffff is missing from the v4 mapped v6 address.
CSCuu78729 EIGRP can install non-successor to RIB in case of ECMP paths
CSCvb99376 N7K send Candidate Default bit in the EIGRP update
CSCva83066 Eigrp loop, route not flushed from topology table
CSCuy77045 configuring "mpls ldp sync" removes "mpls traffic-eng router-id" command
CSCuz67595 Incorect IGP metric calculation for ISIS

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


82
Caveats

Identifier Description
CSCuy99477 Change metrictype of redistributed routes from MPBGP-OSPF from E2 to E1
CSCuv66399 Forwarding address not set in OSPF for routes w/ different prefix length
CSCux69728 LSA stuck in DB
CSCuw03410 Nexus 6.2.x OSPF taking long time in LSA generation
CSCvb16035 NxOS ABR in OSPF totally stubby area does not originate default LSA
CSCuz18971 old/inactive area-ids are not cleared from the ospf db
CSCut11150 OSPF max-metric doesn't work when startup timer value is default
CSCuv81861 OSPF NSSA sending type 7 LSA after converted to regular area
CSCuw27044 OSPFv3 takes 30 min to install route when using link-local addresses
CSCvb06742 OTV SAP ignores MTS high water mark warnings
CSCuy89746 OTV VDC crashes after remote command "reload ascii"
CSCuz51928 icmpv6 crashes because of access to a non-readable memory region.
CSCva11364 ARP hap rest
CSCux63096 CSCuw89606 and CSCut84448
CSCuq72316 N7K:Static route leak w/ unconfig/config SVIs cause traffic black hole
CSCuz55002 BGP table with no nexthop when nexthop learnt thro LU
CSCuu35152 URIB service crash on N7K running 5.2(9)
CSCut46704 vman service may crash unexpectedly
CSCvb48568 Evaluation of N9k/N7k/N5k/N3k/MDS for OpenSSL September 2016 CVEs
CSCuy78340 IP SLA udp jitter v2 time out when no timestamp from netstack
CSCuz46882 rttMonEchoAdminTargetAddress not responding if part of address is zero
CSCuy19010 SNMPd causes boot loop after reload with unload-MIB configuration
CSCuw76278 NX-OS - Netstack panic crash due to buffer lockup
CSCva60566 conflicting features not prevented with bank mapping enabled
CSCuv70053 Mode access interface on AA FEX inactive after reload vPC primary
CSCus61633 N7000 ACLs are not case sensitive
CSCvb76929 N7k: ACL's are not programmed into tcam
CSCvb71127 N7K LC fail to boot up due to "LC insertion sequence failure"
CSCuz91706 Username limited to 28 characters causes issue for vmtracker feature
CSCvb04007 FEX A/A: Convergence takes 5-6 secs on FPC secondary "no shut"
CSCvb79120 N7k/2348UPQ: packet incorrectly forwarded out of HIF ports on port flap
CSCva90035 VRRP VIP not Programmed
CSCva72823 VTP type-2 configuration incompatible on VTPV2_VPC Regression

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


83
Related Documentation

Related Documentation
Cisco Nexus 7000 documentation is available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/tsd-products-support-series
-home.html
The Release Notes for upgrading the FPGA/EPLD is available at the following URL:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/7_x/epld/epld_rn_72.html
Cisco NX-OS documents include the following:

Cisco NX-OS Configuration Guides

Cisco Nexus 7000 series configuration guides are available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-installation-and-c
onfiguration-guides-list.html

Cisco NX-OS Command References

Cisco Nexus 7000 series command references are available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/products-command-referen
ce-list.html

Obtaining Documentation and Submitting a Service Request


For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

© 2018 Cisco Systems, Inc. All rights reserved.

Cisco Nexus 7000 Series NX-OS 8.x, Release Notes


84

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy