About the Guest Shell
In addition to the NX-OS CLI and Bash access on the underlying Linux environment, switches support access to a decoupled execution space running within a Linux Container (LXC) called the “Guest Shell”.
From within the Guest Shell the network-admin has the following capabilities:
-
Access to the network over Linux network interfaces.
-
Access to the switch's bootflash.
-
Access to the switch's volatile tmpfs.
-
Access to the switch's CLI.
-
Access to the switch's host file system.
-
Access to Cisco NX-API REST.
-
The ability to install and run python scripts.
-
The ability to install and run 32-bit and 64-bit Linux applications.
Decoupling the execution space from the native host system allows customization of the Linux environment to suit the needs of the applications without impacting the host system or applications running in other Linux Containers.
On NX-OS devices, Linux Containers are installed and managed with the virtual-service commands. The Guest Shell will appear in the virtual-service show command output.
Note |
By default, the Guest Shell occupies approximately 5 MB of RAM and 200 MB of bootflash when enabled. Beginning with Cisco NX-OS Release 7.0(3)I2(1) the Guest Shell occupies approximately 35 MB of RAM. Use the guestshell destroy command to reclaim resources if the Guest Shell is not used. |
Note |
Beginning with Cisco NX-OS 7.0(3)F3(1)NX-OS 7.0(3)I7(1), the Guest Shell is supported on the Cisco Nexus 95083500 switch. |