Instructions for CISCO models including: 3548, Nexus 3548 Series NX-OS Verified Scalability, Nexus 3548 Series, NX-OS Verified Scalability, Verified Scalability, Scalability
5 feb 2024 — Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release 10.2(5)M-Quick Start Guide: Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release
File Info : application/pdf, 8 Pages, 896.56KB
DocumentDocumentCisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release 10.2(5)M Verified Scalability Limits 2 Introduction 2 Revised: February 5, 2024, Verified Scalability Limits This document describes the Cisco NX-OS configuration limits for the Cisco Nexus 3548. Introduction This document lists the Cisco verified limits for topologies that include Layer 2 and Layer 3 feature configurations. In the following tables, the Verified Topology column lists the verified scaling capabilities with all listed features enabled at the same time. The numbers listed here exceed those used by most customers in their topologies. The scale numbers listed here are not the maximum verified values if each feature is viewed in isolation. The Verified Maximum column lists the maximum scale capability tested for the corresponding feature individually. This number is the absolute maximum currently supported by the Cisco NX-OS Release software for the corresponding feature. If the hardware is capable of a higher scale, future software releases may increase this verified maximum limit. Note If your scale requirements exceed either the Verified Topology or the Verified Maximum limit, please contact your Cisco representative. Based on your requirements, it may be possible to validate support for your requirement, as long as the scale capability of the hardware is not exceeded. Verified Scalability Limits - Unidimensional The tables in this section list the verified scalability limits for Cisco NX-OS Release 10.2(5)M. Table 1: Layer 2 and Layer 3 Topology Configuration Limits Feature Verified Topology Active VLANs per switch 507 (vPC - normal mode) BFD neighbors EIGRP instances MTU STP logical interfaces MST instances MAC table size 0 4 9,216 2,500 63 8,192 Verified Maximum 507 (with RSTP) 4000 (with MSTP) 32 4 9,216 9,000 64 40,000 (vPC , Normal mode) 65,532 (non-vPC , Normal mode) 8,192 (non-vPC , Warp mode) 2 Feature Verified Topology Verified Maximum Port Channels 40 vPC port-channels 8 non-vPC port-channels 40 vPC port-channels 24 non-vPC port-channels Number of member ports per 16 24 Port Channel Number of system logging 0 destination ports SPAN sessions 4 active sessions 1 8 4 active bi-directional sessions2 1 destination ports per session Layer 3 physical interfaces 10 48 Layer 3 SVI, subinterfaces, 256 EtherChannels 1,024 VRF IPv4 hosts 10 4,096 200 65,535 3 IPv4 routes (LPM) 8192 (vPC , Normal mode) 4096 (non-vPC , Warp mode) 24,576 (vPC , Normal mode ) 24,576 (non-vPC , Normal mode ) 4096 (non-vPC , Warp mode) Multicast routes 4000 (vPC , Normal mode) 7,990 (non-vPC , Warp mode) 4000 (vPC , Normal mode) 8,192 (non-vPC , Normal mode) IGMP Snooping groups ECMP4 3,000 2-way 8,192 32-way TCAM entries for ACL 384 ingress (Normal mode) 128 ingress (Warp 3,000 ingress, 1,000 egress (Normal mode) mode) HSRP 256 500 VRRP 2505 2566 Configurable QoS groups 4 4 BGP neighbors 85 100 OSPF instances 4 4 OSPF neighbors 150 (in a single area, area 0) 150 (in a single area, area 0) PIM neighbors 250 250 NAT translations 250 1023 3 Feature Verified Topology Verified Maximum Multicast Service Reflection 400 sessions 1023 (Regular mode) 2047 (Fast Pass mode) 1 Allows same SPAN source in a single direction in 2 SPAN sessions with difference destinations. 2 4 active SPAN sessions regardless of the direction of the SPAN session. 3 The host IP address pattern can lead to a hash collision in the host table and therefore the number of host routes programmed will be lesser than 65,535. To avoid a collision, use a different IP address range. 4 Only supported in Normal Traffic Forwarding mode. 5 A combination of HSRP and VRRP groups, where the total is 250. 6 A combination of HSRP and VRRP groups, where the total is 250. Note The following non-default CoPP values were used for some protocols for the verified topology scale numbers. Table 2: Non-Default CoPP Values Used for vPC Verified Topology Default Values class copp-s-routingProto2 police pps 1300 class copp-s-routingProto1 police pps 1000 class copp-s-pimreg police pps 200 class copp-s-lldp police pps 500 Non-Default Values class copp-s-routingProto2 police pps 500 class copp-s-routingProto1 police pps 1500 class copp-s-pimreg police pps 600 class copp-s-lldp police pps 800 Table 3: Non-VPC Scale Numbers of Cisco Nexus N3548-X Switches Feature Active VLANs per switch Verified Topology 605 (MST Mode) BFD neighbors MTU STP logical interfaces MST instances MAC table size 16 9,216 2,500 1 7375 (90% approx.) Port Channels 7 Non-vPC port-channels Number of member ports 9 per Port Channel Verified Maximum 507 (RSTP Mode) 4013 ( MSTP Mode) 32 9,216 9000 64 65532 (Non-warp Mode) 8192 (Warp Mode) 24 24 4 Feature Verified Topology Number of system 0 logging destination ports SPAN sessions 4 Active sessions 7 Layer 3 physical 10 interfaces Layer 3 SVI, 250 subinterfaces, EtherChannels VRF 11 IPv4 hosts 7400 (90% approx.) IPv4 routes (LPM) 3700 (Non-vPC , WARP mode) Multicast routes 3680 (Non-vPC, WARP mode) IGMP Snooping groups 3,000 ECMP 8 2-way TCAM entries for ACL 384 ingress (Normal mode) 128 ingress (WARP mode) HSRP 256 VRRP 250 9 Configurable QoS groups 4 BGP neighbors 10 OSPF neighbors 10 (in a single area, area 0) PIM neighbors 100 NAT translations 10 Multicast Service 400 Reflection sessions Verified Maximum 8 4 48 1024 200 65,535 (Normal Mode) 8196 (Warp Mode) 24,576 (Non-vPC, Normal Mode) 4096 (Warp Mode) 8192 (VPC Normal Mode) 4096 (Non-VPC, Normal Mode) 8192 32-way 3000 Ingress, 1000 Egress 500 256 4 100 150 250 1023 1023 (Regular mode) 2047 (Fast Pass mode) 5 7 Allows same SPAN source in a single direction in 2 SPAN sessions with difference destinations. 8 Only supported in Normal Traffic Forwarding mode. 9 A combination of HSRP and VRRP groups, where the total is 250. 6 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2023 Cisco Systems, Inc. All rights reserved. Americas Headquarters Cisco Systems, Inc. San Jose, CA 95134-1706 USA Asia Pacific Headquarters CiscoSystems(USA)Pte.Ltd. Singapore Europe Headquarters CiscoSystemsInternationalBV Amsterdam,TheNetherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.