Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(6)
For more information, see Related Content.
Note: The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.
May 13, 2021 |
Added information about 93108TC-FX3P. |
April 25, 2024 |
Added CSCwh50989 to Open Issues. |
■ New and Enhanced Software Features
■ Cisco Network Insights for Data Center
The enhanced features listed below are existing features introduced in earlier releases but enhanced to support new platforms in Cisco NX-OS Release 9.3(6).
New Features |
|
VXLAN and IP-in-IP Tunneling |
Added support for the coexistence of these features for Cisco Nexus 9300-FX2 platform switches. Coexistence of these features requires isolating IP-in-IP tunnels and VXLAN within their own VRFs. By isolating the VRFs, both VXLAN and the tunnels operate independently.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
Enhanced Features |
|
Feature |
Description |
SVI Interfaces for BGP Interface Peering |
Added support for Cisco Nexus 9000 Series switches.
For more information, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 9.3(x). |
PBR over VXLAN |
Added support for Cisco Nexus 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
Proportional Multipath for VNF |
Added support for Cisco Nexus 9500 platform switches with the N9K-C9508-FM-2 fabric module.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
VXLAN EVPN Multi-Site Storm Control |
Added enhancements to optimize rate granularity and accuracy. Bandwidth is calculated based on the accumulated DCI uplink bandwidth, and only interfaces tagged with DCI tracking are considered. In addition, granularity is enhanced by supporting two digits after the decimal point. These enhancements apply to Cisco Nexus 9300-EX, 9300-FX/FXP/FX2/FX3, and 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
VXLAN Flood and Learn |
Added support for Cisco Nexus 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
VXLAN with IPv6 in the Underlay (VXLANv6) |
Added support for Cisco Nexus 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
Proportional Multipath for VNF with Multi-Site |
Introduced this feature for Cisco Nexus 9364C, 9300-EX, and 9300-FX/FX2/FX3 platform switches and Cisco Nexus 9500 platform switches with the N9K-C9508-FM-E2 fabric module and an -EX or -FX line card. This feature allows traffic to be sent across sites if a local VNF is not available.
For more information, see the Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 9.3(x). |
SVI Unnumbered |
Added support for Cisco Nexus 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 9.3(x). |
Multicast Network Load Balancing |
Added Multicast Network Load Balancing support on Cisco Nexus 9300-GX platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 9.3(x). |
Service exclude-bootconfig |
Support added for the service exclude-bootconfig command to exclude the boot nxos image configuration from show and copy configuration commands.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x). |
PTPv1 Forwarding |
Support added for the ptp forward-version1 command which forwards all PTPv1 packets based on the forwarding rule and prevents these packets from being dropped.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x).
|
No new hardware features are introduced for Cisco NX-OS Release 9.3(6).
Where the Z = 1 is always the first FCS release of a Major/Minor release.
Note: The Cisco Nexus 34180YC and 3464C platform switches are not supported in Cisco NX-OS Release 9.3(6).
Bug ID |
Description |
Headline: TRM Multisite: traffic drop on BGW after restarting ngmvpn
Symptoms: TRM traffic loss for 1-2 seconds.
Workarounds: None |
|
Headline: FX2: ipfib crash post ND-ISSU when multicast global-span-tx
Symptoms: On 9300-EX/FX2 switches, ipfib crash is observed post non-disruptive install (ND ISSU) in the presence of the configuration 'hardware multicast global-span-tx’.
Workarounds: Disable by “no hardware multicast global-span-tx”, copy run start or chose disruptive install upgrade. The “hardware multicast global-span-tx” command can be enabled post upgrade. |
|
Headline: Interface BW not accounting unicast BW after SSO switchover
Symptoms: After a switchover, the unicast fabric bandwidth does not get reserved on fabric links.
Workarounds: Flapping the fabric interface should fix it. |
|
Headline: grpc core seeing with the command grpc use-vrf default and no feature grpc/feature grpc
Symptoms: The grpc process crashes when trying to unconfigure grpc (“no feature grpc”) when the base grpc config has “grpc use-vrf default” already configured. After this feature grpc cannot be re-enabled.
Workarounds:
1. Go to bash prompt by doing “run bash sudo su". 2. Kill the grpc process 3 times by doing “kill `pidof grpc”. 3. Check that the process doesn't exist by doing “ps aux | grep grpc”. 4. Come back to CLI from bash shell by running “exit”. 5. The grpc feature can be enabled now if needed. |
|
Headline: Custom COPP causing transit traffic to be punted to the CPU on Nexus 9300-GX2
Symptoms: When custom-COPP policy contains ACL rules which match on Layer 4 destination or source port, transit traffic also hits the COPP and the packets are copied to CPU. This causes duplication of traffic as CPU also routes the copied packets to the destination.
Workarounds: Custom COPP policy using src/dst match mitigates punt for transit traffic. |
Bug ID |
Description |
Headline: FEX 2248 is dropping multicast during IGMP update from client on a different FEX Symptoms: FEX N2K-C2248TP-E-1GE with a Nexus 5000 parent switch is intermittently dropping a small number of multicast packets during IGMP updates coming to the parent switch. Workarounds: Replace the FEX with a switch. |
|
Headline: FEX port running FCoE goes into ErrDisabled (Pause Frame) without RX pause frames The message is: %ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet162/1/2 is down (Error disabled. Reason:error) show interface eth162/1/2 This occurs without any Rx pause frames being received at the time. There was Rx pause frames previously and eventually but when the port is error disabled there are no pause frames being received. Use Ethernet ports on the upstream switch. |
|
Headline: VXLAN Multi-Site storm control This bug documents a change in behavior for EVPN Multi-Site storm control where this feature only uses the bandwidth available on the DCI links. |
|
Headline: Unable to delete PBR under Physical Interface [+] Unable to remove the PBR configured under Physical interface. switch(config)# interface ethernet 1/5 switch# sh accounting log Nothing shown up in logging log and nvram : switch# sh logging nvram last 20 switch# sh logging last 20 2020 Apr 17 07:06:35 switch last message repeated 1 time |
|
Headline: With QinVNI enabled, VXLAN packets in fabric carry .1q tag in outer header |
|
Headline: EVPN: BGW reload in a square topology causes packet loss |
|
Headline: N9K: DHCP Relay ACLs not programmed into TCAM after FEX fabric port-channel member comes up This issue can be reactively worked around by reloading the Cisco Nexus 9500 platform switch without modifying the administrative state of FEX fabric port-channel members. |
|
Headline: CPU-PG stuck after port flapping |------------------------------------------------------------------------------------------------------------| |
|
Headline: N9K Service "tahusd" crashed without intervention 2020 May 20 22:27:21 %$ VDC-1 %$ May 20 22:27:21 %KERN-2-SYSTEM_MSG: [7496306.170307] usd process 29349, uuid 1356 (0x54c) failed to send heartbeat – kernel |
|
Headline: N9K-C93180YC-FX3S/N9K-C93108TC-FX3P: Unknown System-reset on write-erase and powercycle Symptoms: After below mentioned sequence, we see reset caused as Unknown for show system reset-reason CLI. Workarounds: We can check the reset-reason read by fpga read, via for example: for power-cycle the reason number is 0x70(112). an alternative CLI to see reset-reason history is also present: |
|
Headline: VXLAN vPC VTEP - Extended traffic loss when vPC peer reloads before NVE source hold timer expiry Symptoms: Traffic loss for hosts behind vPC in a VXLAN setup. NVE interface remains down after source hold-down timer expiry: From the same device, we can see the following in the log: From here, VXLAN traffic stops and all the devices behind the vPC will have traffic blocked for an extended duration Workarounds: Do not upgrade/reload on the vPC peer switch (SW2) before the NVE source hold-down timer has expired on SW1. |
|
Headline: N9K: Native VLAN is not programmed correctly for Port-channels once re-configured Symptoms: After reload, if the portchannel, that has native VLAN configured, is re-configured to have new native VLAN, before this particular port channel goes to link UP state first time, the new native VLAN is not programmed correctly. LEAF3-FX# show int Po101 LEAF3-FX# sh run int Po101 | i native LEAF3-FX# show sys int eltm info interface Po101 | grep -A 1 Operation LEAF3-FX# show hard int tah int Po101 | i default
LEAF3-FX# conf t LEAF3-FX# sh run int Po101 | i native LEAF3-FX# show sys int eltm info interface Po101 | grep -A 1 Operation LEAF3-FX# show hard int tah int Po101 | i default Workarounds: Bounce affected port channel. |
|
Headline: L2ACLREDIRECT diagnostic test fails for module N9K-X9732C-EX 2020 May 16 05:27:00.314 %DIAGCLIENT-2-EEM_ACTION_HM_SHUTDOWN: Test <L2ACLRedirect> has been disabled as a part of default EEM action |
|
Headline: N9500-R acting as non-DR stops bridging mcast traffic after sg-expiry-timer expires |
|
Headline: usdk_sse: retry_count:3 mts_rcv failed |
|
Headline: N9K - Mgmt0 sending out signals when force admin Shut |
|
Headline: N9K - Mgmt0 RJ45 copper port goes down, once SFP is inserted on SFP port |
|
Headline: Cisco Nexus 92348 back pressure results in PSU fan spinning wrong direction Symptoms: The power supply exhaust fan may spin in the wrong direction on the Cisco Nexus 92348. Workarounds: None |
|
Headline: BGP mass prefix withdrawal causing high CPU spikes for event_manager and policyelem PID Runtime(ms) Invoked uSecs 1Sec Process PID Runtime(ms) Invoked uSecs 1Sec Process PID Runtime(ms) Invoked uSecs 1Sec Process |
|
Headline: nginx process memory leak while polling device via NXAPI 2. Reload the box. |
|
Headline: N9K-C9372PX - Ports Fail to Come Up after upgrade from Cisco NX-OS 7.0(3)I4(7) to 7.0(3)I7(7) |
|
Headline: N9K EOR / N9K-SUP-A+ / Acl-mgr crash Crash Decode: |
|
Headline: Service aclmgr crashing with hap failure in Nexus9K <pre> And the core file is found with the 'show cores' </pre> |
|
Headline: IPV6 Multihop BFD still uses single hop mode even when directly connected interface is shut down OurAddr NeighAddr LD/RD RH/RS Holdown(mult) State Int. Vrf Type On Wireshark capture the device does receives the BFD with lo0: Workarounds: None |
|
Headline: N9K-C93216TC-FX2 - Some ports fail to come up after having cable inserted |
|
Headline: Cisco Nexus 9000 reloads due to "NVE" process
atomic250-lsw03-1 %$ VDC-1 %$ %VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain 1, VPC peer keep-alive receive has failed |
|
Headline: Memory leak in "ascii-cfg" process due to "write-memory" command in archive config |
|
Headline: Cisco NX-OS HSRP stuck in "Initial" state after reload with static HSRP MAC configured <pre> !Command: show running-config interface Vlan2250-2251 version 7.0(3)I7(6) Bios:version 5.3.1 interface Vlan2250 interface Vlan2251 - Reload both switches (Broken VLAN 2251 doesn't come up, Working VLAN 2250 does come up): <pre> N3K-C3172PQ-2# show hsrp brief |
|
Headline: show run all - delay printing output for SAP 296 CLIS |
|
Headline: DHCP request sent towards the server has router ID in option 54 instead of server ID Symptoms: Host doesn’t receive IP address from DHCP server Workarounds: SMU available in software download page for permanent fix. |
|
Headline: TCAM carving rejected with hw-telemetry 128 after upgrade to Cisco NX-OS 9.3(5) |
|
Headline: N9k - IGMP report destined to 224.0.0.x sent back on same port it is received on IP access list block-igmp-link-local |
|
Headline: nfm crashes with flow monitor scale and flow scale |
|
Headline: Cisco Nexus 9500-R heavy RPF failure traffic congesting CPU pipeline causing IGMP drops Symptoms: IGMP groups time out due to dropping of IGMP packets in CoPP. |
|
Headline: Line card PFM going out of sync, extraneous "Module is undergoing ISSU" in XML output The following messages may be reported in the log for the affected module(s): |
|
Headline: Multicast IP PIM register not sent and data packet got punted to CPU. Applying static OIL makes it work. Even after static OIL removal, the working state still remains. The issue will trigger once again, after the sender stops sending packets for a while and the S,G timed out. |
|
Headline: After upgrade from 9.2(3) to 9.3(4), the interface using QSFP-100G-PSM4-S doesn't detect the SFP switch # sh int eth x/y |
|
Headline: avl_iterator does not get initialized in l2fm_send_smac_dump Service: l2fm Started at Fri Apr 24 17:35:19 2020 (737325 us) Start type: SRV_OPTION_RESTART_STATELESS (23) PID: 30215 -Traceback:librsw.so+0x65f86 librsw.so+0x65f86 librsw.so+0x66f67 l2fm+0x10195cce l2fm+0x10197b3b l2fm+0x1076743d l2fm+0x10469a7b l2fm+0x1031f390 libfsrv.so+0x2170d libfsrv.so+0x2394c |
|
Headline: N9K global cmd system dot1q-tunnel transit causes double dot1q tag on egress to server These frames then get subsequently dropped by the end systems which is causing loss of service on the end systems. |
|
Headline: Port profile refresh does not remove DHCP relay address from interface For example, consider a Nexus 9000 device where the SVI for VLAN 10 is configured with DHCP relay servers 198.51.100.10 and 198.51.100.20. N9K# show running-config | section VLAN10 N9K# show running-config interface vlan 10 expand-port-profile A new port profile is created that updates the DHCP relay server 198.51.100.20 to be 198.51.100.30 instead. N9K# show running-config | section VLAN10_new Finally, the existing VLAN10 port profile is refreshed with the contents of the VLAN10_new port profile using the "profile refresh" command. N9K# configure terminal The old "ip dhcp relay address 198.51.100.20" configuration will still appear in the VLAN10 SVI's configuration. N9K# show running-config interface vlan 10 expand-port-profile |
|
Headline: ARP request cannot pass through peer-link after changing default reserved VLAN |
|
Headline: Unable to upgrade from 9.3.2 to 9.3.5 via install all for N9K-C92348GC-X switch# install all nxos bootflash:nxos.9.3.5.bin |
|
Headline: Nexus 9K reboots with "evms hap reset" when evms debug is run and eem is configured at the same time `show cores` `show version` `show logging nvram` `show logging onboard exception-log` exception information --- exception instance 1 ---- switch# show system reset-reason ----- reset reason for module 1 (from Supervisor in slot 1) --- |
|
Headline: Control-Plane Tx will get dropped due to incorrect namespace ID |
|
Headline: VXLAN "VNI range entered is invalid" returned for "no member vni xxxxx" after ISSU |
|
Headline: After ISSU from 7.0(3)I7.7 to 9.3(5) QoS network inconsistency in vPC even config is consistent Workaround 2: Reload |
|
Headline: Traceback: SNMPd crash when cache entry is deleted %SYSMGR-2-SERVICE_CRASHED: Service "snmpd" (PID 27822) hasn't caught signal 11 (core will be saved). Core files are generated in some events, use the 'show process log' command to see if a core was created or not: # show processes log VDC Process PID Normal-exit Stack Core Log-create-time Use the 'show cores vdc-all' command to check for core files. If a core file is present engage TAC to assist with core retrieval, decode, analysis and to identify if this software bug impacts the device: # show cores vdc-all VDC Module Instance Process-name PID Date(Year-Month-Day Time) |
|
Headline: Issues with QinQ Tags after upgrade to Cisco NX-OS 9.3(5) |
|
Headline: ISSU ports with QSFP-100G40G-BIDI remain not connected after a flap |
|
Headline: Cisco NX-OS Incorrect RFC 5424 format after configuring logging rfc-strict 5424 switch# logging rfc-strict 5424 But compared with the RFC 5424, there is an extra half-width space between <PRI> and VERSION in our syslog. |
|
Headline: LDAP search-filter config breaks in Cisco NX-OS 9.3.x Before upgrade: After upgrade: * Problem is: Not able to use all 128 characters in search filter. N9k(config)#ldap search-map <searchMapName> N9k(config-ldap-search-map)# userprofile attribute-name "xxxx" search-filter ? * This search-filter only has 110 characters and it still not accepted. Whereas, we have a limit of 128. N9k(config-ldap-search-map)# userprofile attribute-name "xxxx" search-filter "63charactersString" base-DN "xxxx" |
|
Headline: Port-channel gets added as a SPAN destination in monitor session for EX/FX based LC in EOR However, when you configure the interface first with "switchport monitor" and then put it in a channel-group the config is getting imported from the interface to the port-channel and allowing it in the SPAN destination port EX based LC. |
|
Headline: N9K upgrade/SSO > causing policy elem continuous cores > whole box reloaded
Symptoms: EOR Chassis reload due to policy elem process crash2020 Oct 12 02:08:59 N9K-2-CX %$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "policy elem" (PID 31293) hasn't caught signal 6 (core will be saved).
Workarounds: None |
|
Headline: VXLAN - Traffic to IP x.x.137.2 is wrongly intercepted by OAM Sup ACL
Symptoms: ARPs with Target IP x.x.137.2 in VXLAN Fabric on Decap side are lost. Other IP is same VLAN/VNI works well. This traffic is hitting Sup ACL entry: # show system internal access-list sup-redirect-stats | inc ig OAM 3076 VxLAN OAM 2 >>> <> 3076 VxLAN OAM 10 >>>
Workarounds: Avoid using IP's in range x.x.137.2. |
|
Headline: Cisco Nexus 9000 EOR NLB IGMP multicast on a stick: traffic blackholed if ingress Port-channel split across ASICs
Symptoms: Traffic may be blackholed and some load-balancing combinations may work.
Workarounds: If on a stick NLB deployment, ensure all port-channel members belong to the same physical ASIC (hence the same module). (show interface hardware-mapping)
or
Do not use “on a stick" port-channel deployment. |
|
Headline: Segment routing: route not properly installed on FIB when switch is reloaded
Symptoms: Network topology configured with MPLS+segment-routing has FIB routes pointing to Null0 interface and the traffic is blackholed.
Workarounds: On the PE segment-routing configuration: PE-router# show run segment-routing segment-routing mpls global-block 16000 25000 connected-prefix-sid-map address-family ipv4 1.1.1.1/32 index 7 remove and re-apply the index: PE-router(config)# segment-routing PE-router(config-sr)# mpls PE-router(config-sr-mpls)# connected-prefix-sid-map PE-router(config-sr-mpls-conn-pfxsid)# address-family ipv4 PE-router(config-sr-mpls-conn-pfxsid-af)# no 1.1.1.1/32 index 7 PE-router(config-sr-mpls-conn-pfxsid-af)# 1.1.1.1/32 index 7 |
|
Headline: Ports stay in "connected/UP"state when the Distributed Services Card is down
Symptoms: Nexus switch can't detect that the server is connected to the interface is shut down and port on Nexus shows connected.
Workarounds: Enter shut or no shut. |
|
Headline: NVE source Interface flaps every 3 minutes
Symptoms: NVE source Interface flaps every 3 minutes(or time equal to the delay restore timer expiry)
Workarounds: As of now, only the disruptive workaround of Removing feature vPC and re-applying the configurations for vPC will help to fix.
Note that removing the feature vPC will remove all the vPC associated configurations and so this is a disruptive Change.
|
|
Headline: Mismatch in bucket reassignment when active and standby nodes are down with no fail action
Symptoms: ITD redirects flows from failed primary nodes with failed node level standbys towards other active primary nodes, even when fail action is not configured for the service.
Workarounds:
1. Having services with fail-action node per bucket/node re-assign/node least-bucket (not recommended for vpc scenarios) will still redirect flows of failed nodes towards other active nodes but will allow for correct redirection back to the original primary nodes once they recover and avoid the problem of skewed load-balancing when all nodes are active. 2. Based on the topology and load distribution, if using hot-standby nodes instead of node level standbys is a possibility, the problem would not be encountered. For migration to 9.3.6 once the issue is hit in an older release, user would need to use the default install option (disruptive) to upgrade and allow for the incorrect policies to be fixed. Alternatively, the services would need to be shut down and unshut after a non-disruptive upgrade to fix the incorrect policies. |
|
Headline: DHCP Relay DHCP OFFER broadcast loop/bounce in EVPN Fabric
Symptoms: DHCP offers (broadcast) may bounce back between VTEPs in VXLAN Fabric environment MAC flaps on downstream switches as DHCP offers are reflected back towards the client.
Workarounds: · Disable DHCP relay if not in use for given SVI · Remove DHCP server from vlan that has configured DHCP relay |
|
Headline: BGP core dumped when running show tech-support
Symptoms: BGP core is dumped when running "show tech-support xxx". See "show cores". The reset reason might not be recorded upon the reload.
Workarounds: None |
|
Headline: Cloud Scale ASIC switches Egress RACL not blocking/filtering traffic
Symptoms: · Egress RACL configured on ACL does not block traffic · Egress RACL is not programmed for one or more forwarding blocks/slices Workarounds: Remove and re-configure egress RACL under the VLAN interface/SVI. |
|
Headline: Cisco Nexus 9000/Cloud Scale ASICs ELAM ERROR: FLOP ELAM must be triggered
Symptoms: ELAM report on Cisco Nexus 9000 may give false results for the captured/triggered packet.
Workarounds: Reset, re-trigger and start the ELAM. In most cases the 2nd attempt for same packet trigger results in correct results.
|
|
Headline: Port-security feature may not restrict traffic on the VPC port-channel
Symptoms: In the scenario where the port-security vPC port-channel is configured with violation restrict all source-miss traffic may be allowed by the hardware (due to misprogramming). This can be triggered by removing the port-security feature globally and reconfiguring it afresh.
Workarounds: Port-channel flap may resolve this issue. |
|
Headline: VXLAN - RIB failing to update after tracked static route is suspended.
Symptoms: The wrong route is installed in the RIB instead of the routes from the spine after the tracked static route is suspended.
Workarounds: A possible workaround would be to increase the weight of the two other routes received from the spines. |
|
Headline: Crash after copy r s if any line of banner has characters "% In" at beginning.
Symptoms: Cisco Nexus 9000 device will crash if the beginning of the banner line contains: % In
Workarounds: Do not contain "% In" at beginning of any line. For example:
% In
Replace with:
# In |
|
Headline: Cisco Nexus 9508/9516 with 4k VLAN scale modules go to powered-dn state when upgrading to Cisco NX-OS Release 9.3(3) and above.
Symptoms: In Cisco Nexus 9508/9516 switches modules go to powered down state when upgrading to Cisco NX-OS Release 9.3(3) and above.
Workarounds: Perform the following:
1. Power up one module at a time 2. Reduce VLAN prior to upgrade and re-configure back once up in Cisco NX-OS Release 9.3(3) 3. Downgrade to any release below Cisco NX-OS Release 9.3(3) |
|
Headline: Suppress constant new Mac learn notification due to L2/L3 bind failures.
Symptoms: A Nexus switch may experience high cpu utilization and a high volume of MTS messages when learning a large number of MAC addresses in a burst.
Workarounds: None |
|
Headline: N3K-C36180YC-R: STS LED on the back of the chassis does not light up
Symptoms: On N3K-C36180YC-R, STS LED on the back of the chassis does not light up. No functional impact has been reported by this symptom.
Workarounds: No workaround. As described, no functional impact has been reported by this symptom. |
|
Headline: Cisco Nexus Cloudscale VxLAN-TRM - MFDM prime oiflist leak with high number of IGMP Join/Leave
Symptoms: Multicast traffic is not received by receivers due to resource allocation failure.
Workarounds: None |
|
Headline: Error occurred while trying to read database when recreating an object-group
Symptoms: When attempting to recreate or modify an object-group on the Cisco Nexus 9000 the following error gets displayed: "Error occured while trying to read database"
Workarounds: None |
|
Headline: Once a user connected via NXAPI, user can't delete/modify username
Symptoms: You may not be able to remove a user who logged under NXAPI in the past.
Workarounds: To remove unwanted user following can be done: 1. Backup NXAPI configuration 2. Remove NXAPI feature 3. Remove user in question after changing the assigned role. 4. Reconfigure NXAPI |
|
Headline: Supervisor isolated from chassis after system controllers not responding on EPC&EOBC path
Symptoms: Output only shows the supervisor in the chassis.
Workarounds: Reload the supervisor to restore connectivity to the chassis. |
|
Headline: Multicast routing over GRE in VRF fails.
Symptoms: When configuring multicast routing over a GRE tunnel, and the tunnel is placed into a different VRF than underlay (e.g. "vrf member" is set, but tunnel destination is reachable via global routing table), the GRE tunnel will be seen in the OIL, but actual traffic won't be replicated.
Workarounds: None. |
|
Headline: LACP vpc-convergence + switchport trunk allowed vlan none - Interface Error Disable
Symptoms: Following error messages could be observed with N9k/3k switches: %ETHPORT-5-IF_SEQ_ERROR: Error ("invalid argument to function call") communicating with MTS_SAP_PIXM_LOCAL for opcode MTS_OPC_PIXM_SET_MULT_CBL_VLAN_PORT_STATE (RID_PORT: Ethernet1/10) %ETHPORT-5-IF_DOWN_ERROR_DISABLED: Interface Ethernet1/10 is down (Error disabled. Reason:invalid argument to function call)
Interface is marked as error disabled due to internal error: # show int eth1/10 Ethernet1/10 is down (Internal-Fail errDisable)
# show int eth1/10 brief
-------------------------------------------------------------------------------- Ethernet VLAN Type Mode Status Reason Speed Port Interface Ch # -------------------------------------------------------------------------------- Eth1/10 1 eth trunk down Internal-Fail errDisabl auto(D) 5
Workarounds: Allow at least one VLAN under port-channel interface with "lacp vpc-convergence" configured: Example: Switch# switchport trunk allowed vlan 2 |
|
Headline: Cisco Nexus 9000 experience a Crash due to Fatal Module Error
Symptoms: Nexus N9K may experience a software crash due to Fatal Module Error. This can be seen either in "show version" or "show system reset-reason".
Workarounds: Unknown |
|
Headline: Cisco Nexus 9000, Release 9.3(3) OSPF non-0 FA when redistributing the OSPF route from VRF to default
Symptoms: OSPF receives type-5 LSA with a non-0 FA pointing to unreachable address. It prevents OSPF installing the prefix into the RIB since FA is unreachable.
Workarounds: N/A |
|
Headline: Locally originated control packets to directly connected host sent towards EVPN fabric instead
Symptoms: · the LEAF A while originating the IPv6 BGP packets towards directly connected FW, sends it across EVPN fabric instead of directly · the remote LEAVES (C/D) bounces the packet back and then it's correctly forwarded towards Firewall. · capture of packets (eg. ethanalyzer) originated by LEAF A shows that the packet gets VxLAN encapsulated and sent towards the VIP of leaves C/D Workarounds: None |
|
Headline: Nexus 9500 forwards traffic after TTL expires
Symptoms: Nexus 9500 with modules N9K-X9732C-EX and N9K-X97160YC-EX. Packets received with a TTL=1 on this Nexus are forwarded instead of dropped, also we generate a reply back to the source with an ICMPv4 Type 11, Code 0 Time Exceeded message, last part is correct, however, we should drop these packets.
Issue is seen only when packet is received on one module and we need to forward it on a different module, therefore, FM is on the path and we see packets with TTL=0 or TT=1 being forwarded, this issue is not seen when ingress and egress module are the same.
Workarounds: None |
|
Headline: Tahusd crash due to link flapping
Symptoms: 2020 Oct 28 04:22:12 STLD1-630-01-03-N9K-RU28 %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "tahusd" (PID 11733) hasn't caught signal 6 (core will be saved). 2020 Oct 28 04:22:15 STLD1-630-01-03-N9K-RU28 %SYSMGR-SLOT1-2-HAP_FAILURE_SUP_RESET: Service "tahusd" in vdc 1 has had a hap failure 2020 Oct 28 04:22:15 STLD1-630-01-03-N9K-RU28 %SYSMGR-SLOT1-2-LAST_CORE_BASIC_TRACE: fsm_action_become_offline: PID 30279 with message Could not turn off console logging on vdc 1 error: mts req-response with syslogd in vdc 1 failed (0xFFFFFFFF) . 2020 Oct 28 04:22:51 STLD1-630-01-03-N9K-RU28 %KERN-2-SYSTEM_MSG: [147094.667915] usd process 11733, uuid 1356 (0x54c) tahusd failed to send heartbeat - kernel
# show system reset-reason ----- reset reason for module 1 (from Supervisor in slot 1) --- 1) At 81613 usecs after Wed Oct 28 04:25:29 2020 Reason: Reset Requested due to Fatal Module Error Service: tahusd hap reset Version: 9.3(5)
Workarounds: None |
|
Headline: BFD rate-limiter resources exhausted for transit traffic with udp port 6784
Symptoms: BFD rate-limiter resources may be consumed by transit traffic with udp destination port 6784. This is the same port that micro bfd uses (bfd per-link).
Any BFD session passing through this hardware rate-limiter may be impacted randomly 9.3(5) if the resources are exhausted.
Workarounds: Use an ACL at the edge of the network to block udp 6784. |
|
Headline: aclqos core dump generated when removing an ACE from the access list
Symptoms: When negating a sequence of an ACE in the ACL, the switch crashes in aclqos service.
Workarounds: Find the destination where there is a mismatch of the ACEs and remove/add policy from that destination. |
|
Headline: VLAN shown in show interface status is incorrect
Symptoms: VLAN shown in "show interface status" command output is wrong.
Workarounds: None |
|
Headline: Multicast Frame Error did not mark in "drop info" in ELAM summary
Symptoms: Multicast packet got frame error on packet size or the multicast group member is missing. ELAM summary failed to show the correct drop information but the ELAM report detail does drop info.
Workarounds: do (TAH-elam-insel6)# report detail | sec STA_rwb_drop_vector_capture_access Instead
Following output can be seen
sun[0].rwx[0].STA_rwb_drop_vector_capture_access: 0x000000800. <<< DROP CAPTURED info: 0x000000800 ... ... info.eoferr_first_cell: 0x1 <<< Frame error |
|
Headline: config-replace adds "switchport vlan mapping all dot1q-tunnel" in checkpoint causing CR failure
Symptoms: While MACSec config replacement is done it was discovered that other areas of config-replace were also broken. The. attached base (test1-base.conf), target (test1-target.conf) configs and the failed log file will allow the issue to be reproduced consistently.
Workarounds: N/A |
|
Headline: FX2/MLD: IGMP/MLD crash on secondary VPC peer due to missing null check for group header
Symptoms: MLD and IGMP crash
Workarounds: None |
|
Headline: Configure replace fails with hostname change for VDC
Symptoms: Configure replace will fail with an error when used with verify-only option.
Workarounds: Do show running-config and copy paste the below line and add it to the top of the Config-replace file: Lab# sh running-config
!Command: show running-config !Running configuration last done at: Tue Oct 20 16:27:49 2020 !Time: Tue Oct 20 16:29:58 2020
version 9.3(2) Bios:version 07.67 <<<<<<<< |
|
Headline: Crash in ipqosmgr service after QoS policy change and show startup-config" CLI
Symptoms: QoS policy configuration change leads to crashes once saved and loaded from startup configuration. “show startup-config” is a known trigger.
Workarounds: None |
|
Headline: DHCPv6 relay - High CPU DHCP snooping
Symptoms: High CPU in DHCP snooping process. High MTS build up for DHCP snooping UDP sockets.
Workarounds: None |
|
Headline: Cisco Nexus 9000 EOR "hardware access-list tcam region ing-netflow 512" not working after upgrade
Symptoms: For EOR N9K, after upgrade, access-list tcam size of ing-netflow shows 0 “Hardware access-list tcam region ing-netflow 512" not working (no warning, running config does not change)
Workarounds: Config the tcam size to one value higher than 512 (such as 1024) than config to 512 again. |
|
Headline: SNMPD core on N3K-C3408-S running longevity with Cisco NX-OS Release 9.3(3) CCO for 47 days
Symptoms: The snmpd process may crash after running for a long time.
Workarounds: None |
|
Headline: Cisco Nexus 9000 could not learn MAC address of silent hosts after multiple TCN occurrence
Symptoms: The MAC addresses of the silent hosts might not be learnt by N9K after continuous TCN occurrence.
Workarounds:
1. Clear ip arp of the affected host clear ip arp x.x.x.x vrf XXXX
2. Configure “ip arp delete-adj-on-mac-delete" under SVI (gateway). Cisco Nexus 9000 will delete all ARPs of this vlan after receiving TCN. The re-learning of ARP will be triggered by traffic. |
|
Headline: Reload: Kernel Panic triggered by nxpython process
Symptoms: nxpython process repeatedly crashed and then kernel panic
Workarounds: The root cause is that nxpython process crashes repeatedly. If a process crashes repeatedly before it hits kernel panic, it might try to stop/remove the process from the system. |
|
Headline: IGMPV0 leave is re-generated across the peer-link when mrouter port is auto-renewed without querier.
Symptoms: External V2 querier did not send in the membership query but constantly sent to PIM Join. This will cause the querier absent from transition device but the mrouter port still presented. At the same time, receiver is promoting v3 membership report with link-local mcast group along with other groups.
Based on these prequisition, the end result is the device (device that got the IGMP signalling) across the peer-link (the one that have mrouter port towards external querier) start re-generating the IGMP leave with IGMPV0.
Workarounds: Manual configure igmp v2 querier on Local Nexus. |
|
Headline: Nexus9000 C93180YC-FX3S-Fan PID needs to be changed from NXA-FAN-30CFM-B to NXA-FAN-35CFM-PI
Symptoms: Wrong FAN PID outputs with “show inventory”, and PID needs to be changed from NXA-FAN-30CFM-B to NXA-FAN-35CFM-PI
Workarounds: N/A |
|
Headline: Port-Security secure learn for non-vPC vlan incorrectly synced to vPC peer on Peer-Link
Symptoms: -Secure learn for non vPC vlan end device on the peer-link -Loss of connectivity from end host with incorrect secure mac learn on peer-link to remote vPC peer switch because of the active mac learn on an interface where the vlan is not allowed.
-MACDB entries for ignoring correct dynamic learn because of bad existing secure learn "IGN_NL_SEC_MAC_PRESE" sh system internal l2fm l2dbg macdb add maca.maca.maca Month Day xx:xx:xx 2020 0x16000001 0 IGN_NL_SEC_MAC_PRESE 3 0 0x2
Workarounds: Allow non vPC vlans with secure mac learns on the peer-link where the overriding secure learn is seen. |
|
Headline: DHCP snooping binding not refresh
Symptoms: If have approximate 2000 dhcp snooping entries in N9K after reloading the dhcp snooping binding will not refresh.
Workarounds: None |
|
Headline: N9K-C92348GC-X: ND ISSU Control Plane Downtime is High
Symptoms: ND ISSU Control Plane downtime might be higher than 120sec on certain N9K-C92348GC-X switches. This can cause protocol flaps resulting traffic loss.
Workarounds: N/A |
|
Headline: Macsec ports in Auth-pending state with addition of valid keychain from Empty keychain
Symptoms: Ports will be in ‘Auth Pending’ when policies are changed using empty keychain.
Workarounds: Reload. |
|
Headline: Nexus 9348GC-FXP with half duplex sees Rx Frm Rcv Errors
Symptoms: Collisions/CRC will be seen on half duplex links with bidirectional traffic.
Performance impact will be seen for the hosts that are connected on half duplex links.
Workarounds: None |
Setting the value of "none" for the property authName, basically stands for a zero value, which is not allowed, and shouldn’t be used. Allowable values other than "none" should be used as inputs to this property. |
|
The allocate-label option-b command is disabled and not shown in the configuration unless MPLS Layer 3 VPN is enabled. This is achieved by entering the feature mpls l3vpn command. |
|
An NVE interface is required to be in shut state before making changes to the source-interface for NVE. Trying to do the default operation on NVE interface brings it out of the shut state as it performs a no shut first. This causes the operation to fail as there is an attempt to modify the source-interface in the no shut mode. Fixing this might require changes to how the default keyword behaves fundamentally. This can affect other types of interfaces, as well, as they too can be operated on using the default keyword. For this reason, if there is a need to remove the configuration for the NVE interface, enter the shut command on the NVE interface. Then enter the no interface nve 1 command, followed by reconfiguring the NVE interface with the new configuration. |
|
Due to an ASIC limitation, FC-FEC cannot be configured on the native (non-retimer) ports (ports 25-36) of N9K-C93600CD-GX when broken out to 2x50G. Only RS-FEC and FEC off are supported. To be consistent, the retimer port (ports 1-24) capabilities are also being limited to RS-FEC and FEC off when broken out to 2x50G. There is no plan to enable FC-FEC on the retimer ports for this reason, so this CDET is being closed. |
|
Workarounds: Avoid these connections. Ports 9-28 on the Cisco Nexus N9K-C9236C can be used instead. |
|
If the issue is seen, pinned static routes can be deleted and added back. Also, entering the clear ip route vrf <vrf-name> command can be done to recover from the issue. |
|
When large files, for example NX-OS, images are copied to USB, the following message is printed: As long as these messages correspond to a copy operation to USB, this message can be ignored. |
|
</nf:source> <============nf: is extra <namespace> : extra characters are seen with XML and JSON from NX-API. |
|
PTP is not supported on the 96136YC-R line card or for line cards on the Cisco Nexus 9504 switch. |
|
The following features are not supported on the Cisco Nexus 9364C switch. |
|
■ The following feature is not supported on the Cisco Nexus 9332C: |
|
Only the following switches support QSFP+ with the QSFP to SFP/SFP+ adapter (40 Gb to 10 Gb): |
|
The Cisco Nexus 9300 platforms support for the QSFP+ breakout has the following limitations: ■ For the Cisco Nexus 9332PQ switch, all ports except 13-14 and 27-32 can support breakout. |
|
The following switches and line cards support the breakout cable (40 Gb ports to 4x10-Gb ports): ■ N9K-C93180LC-EX—last four ports are breakout capable (10x4, 24x4, 50x2) |
|
Limitations for ALE (Application Link Engine) uplink ports are listed at the following location: Limitations for ALE 40G Uplink Ports on Cisco Nexus 9000 Series Switches |
|
N/A |
Converting Type-6 encrypted passwords back to original state is not supported on MACSec chain. |
After updating the syslog server address, the “This server is temporarily unreachable” message/text is provided as an output. This will continue until the source interface is reconfigured. The workaround is to delete and reconfigure the source interface settings. |
|
On Cisco Nexus N2K-C2348TQ HIFs fail to utilize redundant Port-Channel links, to NIF, during link failover events. |
Table 1 Cisco Nexus 9500 Switches
Table 2 Cisco Nexus 9500 Cloud Scale Line Cards
Table 3 Cisco Nexus 9500 R-Series Line Cards
Table 4 Cisco Nexus 9500 Classic Line Cards
Table 5 Cisco Nexus 9500 Cloud Scale Fabric Modules
Table 6 Cisco Nexus 9500 R-Series Fabric Modules
Table 7 Cisco Nexus 9500 Fabric Modules
Table 8 Cisco Nexus 9500 Fabric Module Blanks with Power Connector
Table 9 Cisco Nexus 9500 Supervisor Modules
Table 10 Cisco Nexus 9500 System Controller
Table 11 Cisco Nexus 9500 Fans and Fan Trays
Table 12 Cisco Nexus 9500 Power Supplies
Table 13 Cisco Nexus 9200 and 9300 Fans and Fan Trays
Table 14 Cisco Nexus 9200 and 9300 Power Supplies
Table 15 Cisco Nexus 9200 and 9300 Switches
Table 16 Cisco Nexus 9000 Series Uplink Modules
Table 1 Cisco Nexus 9500 Switches
Table 2 Cisco Nexus 9500 Cloud Scale Line Cards
Table 3 Cisco Nexus 9500 R-Series Line Cards
Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card |
|||
Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card |
|||
Table 4 Cisco Nexus 9500 Classic Line Cards
Table 5 Cisco Nexus 9500 Cloud Scale Fabric Modules
Table 6 Cisco Nexus 9500 R-Series Fabric Modules
Table 7 Cisco Nexus 9500 Fabric Modules
Table 8 Cisco Nexus 9500 Fabric Module Blanks with Power Connector
Cisco Nexus 9508 Fabric blank with Fan Tray Power Connector module |
|||
Cisco Nexus 9516 Fabric blank with Fan Tray Power Connector module |
Table 9 Cisco Nexus 9500 Supervisor Modules
Table 10 Cisco Nexus 9500 System Controller
Table 11 Cisco Nexus 9500 Fans and Fan Trays
Table 12 Cisco Nexus 9500 Power Supplies
Table 13 Cisco Nexus 9200 and 9300 Fans and Fan Trays
Fan 1 module with port-side intake airflow (burgundy coloring) |
||||
Fan 2 module with port-side intake airflow (burgundy coloring) |
||||
Fan 3 module with port-side intake airflow (burgundy coloring) |
||||
Fan module with port-side intake airflow (burgundy coloring) |
||||
|
||||
Fan module with port-side intake airflow (burgundy coloring) |
|
|||
Fan module with port-side intake airflow (burgundy coloring) |
92160YC-X |
|||
92160YC-X |
||||
93108TC-FX3P 93180YC-FX3S2 |
||||
Fan module with port-side intake airflow (burgundy coloring) |
93180YC-FX3S2 |
|||
Fan module with port-side exhaust airflow (burgundy coloring) |
1For specific fan speeds see the Overview section of the Hardware Installation Guide.
2 This switch runs with +1 redundancy mode so that if one fan fails, the switch can sustain operation. But if a second fan fails, this switch is not designed to sustain operation. Hence before waiting for the major threshold temperature to be hit, the switch will power down due to entering the fan policy trigger command.
Table 14 Cisco Nexus 9200 and 9300 Power Supplies
Product ID |
Description |
Quantity |
Cisco Nexus Switches |
|
NXA-PAC-500W-PE |
500-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
93108TC-EX |
93180YC-EX 93180YC-FX |
NXA-PAC-500W-PI |
500-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
93108TC-EX |
93180YC-EX 93180YC-FX |
N9K-PAC-650W |
650-W AC power supply with port-side intake (burgundy coloring) |
2 |
9332PQ 9372TX |
9372TX-E |
N9K-PAC-650W-B |
650-W AC power supply with port-side exhaust (blue coloring) |
2 |
9332PQ 9372TX |
9372TX-E |
NXA-PAC-650W-PE |
650-W power supply with port-side exhaust (blue coloring) |
2 |
92160YC-X 93180YC-FX3S |
92304QC |
NXA-PAC-650W-PI |
650-W power supply with port-side intake (burgundy coloring) |
2 |
92160YC-X 93180YC-FX3S |
92304QC |
NXA-PAC-750W-PE |
750-W AC power supply with port-side exhaust airflow (blue coloring) 1 |
2 |
9336C-FX2 93240YC-FX2 |
9332C 9336C-FX2 |
NXA-PAC-750W-PI |
750-W AC power supply with port-side exhaust airflow (burgundy coloring) 1 |
2 |
9336C-FX2 93240YC-FX2 |
9332C 9336C-FX2 |
NXA-PAC-1100W-PE2 |
1100-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
93240YC-FX2 9332C 9316D-GX |
9336C-FX2 93600CD-GX |
NXA-PAC-1100W-PI2 |
1100-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
93240YC-FX2 9332C 9316D-GX |
9336C-FX2 93600CD-GX |
NXA-PAC-1100W-PI |
Cisco Nexus 9000 PoE 1100W AC PS, port-side intake |
2 |
93108TC-FX3P |
|
NXA-PAC-1100W-PE |
Cisco Nexus 9000 PoE 1100W AC PS, port-side exhaust |
2 |
93108TC-FX3P |
|
NXA-PAC-1900W-PI |
Cisco Nexus 9000 PoE 1900W AC PS, port-side intake |
2 |
93108TC-FX3P |
|
N9K-PAC-1200W |
1200-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
93120TX |
|
N9K-PAC-1200W-B |
1200-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
93120TX |
|
NXA-PAC-1200W-PE |
1200-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
9272Q |
9364C |
NXA-PAC-1200W-PI |
1200-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
9272Q |
9364C |
N9K-PUV-1200W |
1200-W Universal AC/DC power supply with bidirectional airflow (white coloring) |
2 |
92160YC-X 93180YC-FX3S |
93120TX |
NXA-PDC-930W-PE |
930-W DC power supply with port-side exhaust airflow (blue coloring) |
2 |
9272Q |
93120TX |
NXA-PDC-930W-PI |
930-W DC power supply with port-side intake airflow (burgundy coloring) |
2 |
9272Q |
93120TX |
NXA-PDC-1100W-PE |
1100-W DC power supply with port-side exhaust airflow (blue coloring) |
2 |
93240YC-FX2 93600CD-GX 9316D-GX |
9332C 9336C-FX2 |
NXA-PDC-1100W-PI |
1100-W DC power supply with port-side intake airflow (burgundy coloring) |
2 |
93240YC-FX2 93600CD-GX 9316D-GX |
9332C 9336C-FX2 |
UCSC-PSU-930WDC |
930-W DC power supply with port-side intake (green coloring) |
2 |
92160YC-X |
9332PQ 9372TX |
UCS-PSU-6332-DC |
930-W DC power supply with port-side exhaust (gray coloring) |
2 |
92160YC-X |
9332PQ 9372TX |
NXA-PHV-1100W-PE |
1100-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
93240YC-FX2 |
9336C-FX2 |
NXA-PHV-1100W-PI |
1100-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
93240YC-FX2 |
9336C-FX2 |
NXA-PAC-2KW-PE |
2000-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
9364C-GX |
|
NXA-PAC-2KW-PI |
2000-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
9364C-GX |
|
NXA-PDC-2KW-PE |
2000-W DC power supply with port-side exhaust airflow (blue coloring |
2 |
9364C-GX |
|
NXA-PDC-2KW-PI |
2000-W DC power supply with port-side intake airflow (burgundy coloring) |
2 |
9364C-GX |
|
N2200-PAC-400W |
400-W AC power supply with port-side exhaust airflow (blue coloring) |
2 |
92348GC-X |
|
N2200-PAC-400W-B |
400-W AC power supply with port-side intake airflow (burgundy coloring) |
2 |
92348GC-X |
|
N2200-PDC-350W-B |
350-W DC power supply with port-side intake airflow |
2 |
92348GC-X |
|
N2200-PDC-400W |
400-W DC power supply with port-side exhaust airflow (blue coloring) |
2 |
92348GC-X |
|
1 Compatible with Cisco NX-OS Release 9.3(3) and later.
Table 15 Cisco Nexus 9200 and 9300 Switches
Table 16 Cisco Nexus 9000 Series Uplink Modules
An enhanced version of the Cisco Nexus N9K-M6PQ uplink module. |
|
Cisco Nexus 9300 uplink module with 12 40-Gigabit Ethernet QSPF+ ports. |
To determine which transceivers and cables are supported by a switch, see the Transceiver Module (TMG) Compatibility Matrix.
To see the transceiver specifications and installation information, see the Install and Upgrade Guides.
For more information, see the Cisco Network Insights documentation.
To perform a software upgrade or downgrade, follow the instructions in the Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(x).
For information about an In Service Software Upgrade (ISSU), see the Cisco NX-OS ISSU Support Matrix.
■ Cisco Nexus 9200, 9300-EX, and 9300-FX Platform Switches
■ Cisco Nexus 9300-FX3 Platform Switches
■ Cisco Nexus 9300-GX Platform Switches
■ Cisco Nexus 9500 Platform N9K-X9408PC-CFP2 Line Card and 9300 Platform Switches
■ ACL filters to span subinterface traffic on the parent interface
■ FEX (not supported for Cisco Nexus 9200 platform switches)
■ GRE v4 payload over v6 tunnels
■ IP-in-IP (not supported on the Cisco Nexus 92160 switch)
■ Maximum Transmission Unit (MTU) checks for packets received with an MPLS header
■ NetFlow (not supported on Cisco Nexus 9200 platform switches)
■ Packet-based statistics for Traffic Storm Control (only byte-based statistics are supported)
■ PVLANs (not supported on Cisco Nexus 9200 platform switches)
■ PXE boot of the Cisco NX-OS image from the loader (not supported for Cisco Nexus 9272PQ and 92160YC switches)
■ Q-in-VNI (not supported on Cisco Nexus 9200 platform switches)
■ Q-in-Q for VXLAN (not supported on Cisco Nexus 9200 and 9300-EX platform switches)
■ Q-in-VNI (not supported on Cisco Nexus 9200 platform switches)
■ Resilient hashing for port channels
■ SVI uplinks with Q-in-VNI (not supported for Cisco Nexus 9300-EX platform switches)
■ Traffic Storm Control for copy-to-CPU packets
■ Traffic Storm Control with unknown multicast traffic
■ Tx SPAN for multicast, unknown multicast, and broadcast traffic
■ VACL redirects for TAP aggregation
The following features are not supported for the Cisco Nexus 9300-FX3 Platform switches:
■ ACL with DSCP Wildcard Mask
■ ARP Suppression with Reflective Relay
■ Dynamic ACL - Named ACL support for applying blacklist/limited VLAN access for devices
■ ECMP Hashing based on GRE Inner IP Header
■ Enhanced ISSU
■ Enhanced Policy-Based Routing (ePBR)
■ ePBR Multi-Hop
■ ePBR with Probes
■ ePBR with User-Defined Probes
■ IPv6 MIB support (IP-MIB)
■ Multicast Service Reflection (Ingress, PIM-border, Egress)
■ Multiple LLDP neighbors per physical interface
■ Secure VXLAN EVPN Multi-Site using CloudSec
■ Selective Q-in-VNI + Advertise PIP on a VTEP
■ Selective Q-in-VNI + VXLAN VLAN on the same port
■ Standard ISSU
■ Symmetric Hashing - ECMP (Inner DA)
■ Unidirectional Ethernet (UDE)
■ VXLAN EVPN with downstream VNI
■ VXLAN over parent interface that also carries sub-interfaces
The following features are not supported for the Cisco Nexus 9300-GX platform switches:
■ Autonegotiation on all ports
■ Enhanced ISSU
■ Standard ISSU
■ FEX (supported on some Cisco Nexus 9300 platform switches)
■ Flows other than 40G
■ Multichassis EtherChannel Trunk (MCT)
■ Precision Time Protocol (PTP)
■ PVLAN (supported on Cisco Nexus 9300 platform switches)
■ Shaping support on 100g port is limited
■ SPAN destination/ERSPAN destination IP
The following features are not supported for FEX modules:
■ Active-Active FEX and straight-through FEX are not supported on the Cisco Nexus 92348GC switch.
■ For Cisco Nexus 9500 platform switches, 4x10-Gb breakout for FEX connectivity is not supported.
■ Ports 29-36 do not support 1 Gbps speed.
The following features are not supported for Cisco Nexus 9500 platform switches with -EX/FX line cards:
■ IPv6 support for policy-based routing
■ SPAN port-channel destinations
Cisco Nexus 3000 and 9000 Series NX-API REST SDK User Guide and API Reference: Cisco Nexus NX-API Reference
Cisco Nexus 9000 Series documentation: Cisco Nexus 9000 Series Switches
Cisco Nexus 9000 and 3000 Series NX-OS Switch License Navigator: Cisco Nexus 9000 and 3000 Series NX-OS Switch License Navigator
Cisco Nexus 9000 Series Software Upgrade and Downgrade Guide: Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 9.3(x)
Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes: Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 9.3(6)
Cisco Nexus OpenConfig YANG Reference, Release 9.3(x): Cisco Nexus OpenConfig YANG Reference, Release 9.3(x)
Cisco NX-OS Supported MIBs: ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.html
Supported FEX modules: Cisco Nexus 9000 Series Switch FEX Support Matrix.
Licensing Information: Cisco NX-OS Licensing Guide
For more information, see the Cisco NX-OS Licensing Guide.
To provide technical feedback on this document, or to report an error or omission, please send your comments to nexus9k-docfeedback@cisco.com. We appreciate your feedback.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)