Instructions for CISCO models including: 3548, Nexus 3548 Series NX-OS Verified Scalability, Nexus 3548 Series, NX-OS Verified Scalability, Verified Scalability, Scalability

Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release 10.2(5)M

Unknown

Cisco Nexus 3548 Series NX-OS Verified Scalability Guide ...

5 feb 2024 — Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release 10.2(5)M-Quick Start Guide: Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release


File Info : application/pdf, 8 Pages, 896.56KB

PDF preview unavailable. Download the PDF instead.

cisco-nexus-3548-verified-scalability-guide-1025
Cisco Nexus 3548 Series NX-OS Verified Scalability Guide, Release 10.2(5)M
Verified Scalability Limits 2 Introduction 2

Revised: February 5, 2024,
Verified Scalability Limits
This document describes the Cisco NX-OS configuration limits for the Cisco Nexus 3548.
Introduction
This document lists the Cisco verified limits for topologies that include Layer 2 and Layer 3 feature configurations. In the following tables, the Verified Topology column lists the verified scaling capabilities with all listed features enabled at the same time. The numbers listed here exceed those used by most customers in their topologies. The scale numbers listed here are not the maximum verified values if each feature is viewed in isolation. The Verified Maximum column lists the maximum scale capability tested for the corresponding feature individually. This number is the absolute maximum currently supported by the Cisco NX-OS Release software for the corresponding feature. If the hardware is capable of a higher scale, future software releases may increase this verified maximum limit.

Note If your scale requirements exceed either the Verified Topology or the Verified Maximum limit, please contact your Cisco representative. Based on your requirements, it may be possible to validate support for your requirement, as long as the scale capability of the hardware is not exceeded.

Verified Scalability Limits - Unidimensional
The tables in this section list the verified scalability limits for Cisco NX-OS Release 10.2(5)M.
Table 1: Layer 2 and Layer 3 Topology Configuration Limits

Feature

Verified Topology

Active VLANs per switch 507 (vPC - normal mode)

BFD neighbors EIGRP instances MTU STP logical interfaces MST instances MAC table size

0 4 9,216 2,500 63 8,192

Verified Maximum 507 (with RSTP) 4000 (with MSTP) 32 4 9,216 9,000 64 40,000 (vPC , Normal mode) 65,532 (non-vPC , Normal mode) 8,192 (non-vPC , Warp mode)

2

Feature

Verified Topology

Verified Maximum

Port Channels

40 vPC port-channels 8 non-vPC port-channels

40 vPC port-channels 24 non-vPC port-channels

Number of member ports per 16

24

Port Channel

Number of system logging 0 destination ports

SPAN sessions

4 active sessions
1

8
4 active bi-directional sessions2 1 destination ports per session

Layer 3 physical interfaces 10

48

Layer 3 SVI, subinterfaces, 256 EtherChannels

1,024

VRF IPv4 hosts

10 4,096

200 65,535 3

IPv4 routes (LPM)

8192 (vPC , Normal mode) 4096 (non-vPC , Warp mode)

24,576 (vPC , Normal mode ) 24,576 (non-vPC , Normal mode ) 4096 (non-vPC , Warp mode)

Multicast routes

4000 (vPC , Normal mode) 7,990 (non-vPC , Warp mode)

4000 (vPC , Normal mode) 8,192 (non-vPC , Normal mode)

IGMP Snooping groups ECMP4

3,000 2-way

8,192 32-way

TCAM entries for ACL

384 ingress (Normal mode) 128 ingress (Warp 3,000 ingress, 1,000 egress (Normal mode) mode)

HSRP

256

500

VRRP

2505

2566

Configurable QoS groups 4

4

BGP neighbors

85

100

OSPF instances

4

4

OSPF neighbors

150 (in a single area, area 0)

150 (in a single area, area 0)

PIM neighbors

250

250

NAT translations

250

1023

3

Feature

Verified Topology

Verified Maximum

Multicast Service Reflection 400 sessions

1023 (Regular mode) 2047 (Fast Pass mode)

1 Allows same SPAN source in a single direction in 2 SPAN sessions with difference destinations. 2 4 active SPAN sessions regardless of the direction of the SPAN session. 3 The host IP address pattern can lead to a hash collision in the host table and therefore the number of host routes programmed
will be lesser than 65,535. To avoid a collision, use a different IP address range. 4 Only supported in Normal Traffic Forwarding mode. 5 A combination of HSRP and VRRP groups, where the total is 250. 6 A combination of HSRP and VRRP groups, where the total is 250.

Note The following non-default CoPP values were used for some protocols for the verified topology scale numbers.

Table 2: Non-Default CoPP Values Used for vPC Verified Topology
Default Values
class copp-s-routingProto2 police pps 1300
class copp-s-routingProto1 police pps 1000
class copp-s-pimreg police pps 200
class copp-s-lldp police pps 500

Non-Default Values
class copp-s-routingProto2 police pps 500
class copp-s-routingProto1 police pps 1500
class copp-s-pimreg police pps 600
class copp-s-lldp police pps 800

Table 3: Non-VPC Scale Numbers of Cisco Nexus N3548-X Switches

Feature
Active VLANs per switch

Verified Topology 605 (MST Mode)

BFD neighbors MTU STP logical interfaces MST instances MAC table size

16 9,216 2,500 1 7375 (90% approx.)

Port Channels

7 Non-vPC port-channels

Number of member ports 9 per Port Channel

Verified Maximum 507 (RSTP Mode) 4013 ( MSTP Mode) 32 9,216 9000 64 65532 (Non-warp Mode) 8192 (Warp Mode) 24 24

4

Feature

Verified Topology

Number of system

0

logging destination ports

SPAN sessions

4 Active sessions
7

Layer 3 physical

10

interfaces

Layer 3 SVI,

250

subinterfaces,

EtherChannels

VRF

11

IPv4 hosts

7400 (90% approx.)

IPv4 routes (LPM)

3700 (Non-vPC , WARP mode)

Multicast routes

3680 (Non-vPC, WARP mode)

IGMP Snooping groups 3,000

ECMP
8

2-way

TCAM entries for ACL 384 ingress (Normal mode) 128 ingress (WARP mode)

HSRP

256

VRRP

250

9

Configurable QoS groups 4

BGP neighbors

10

OSPF neighbors

10 (in a single area, area 0)

PIM neighbors

100

NAT translations

10

Multicast Service

400

Reflection sessions

Verified Maximum 8
4
48
1024
200 65,535 (Normal Mode) 8196 (Warp Mode) 24,576 (Non-vPC, Normal Mode) 4096 (Warp Mode) 8192 (VPC Normal Mode) 4096 (Non-VPC, Normal Mode) 8192 32-way
3000 Ingress, 1000 Egress
500 256
4 100 150 250 1023 1023 (Regular mode) 2047 (Fast Pass mode)
5

7 Allows same SPAN source in a single direction in 2 SPAN sessions with difference destinations. 8 Only supported in Normal Traffic Forwarding mode. 9 A combination of HSRP and VRRP groups, where the total is 250. 6

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.

Americas Headquarters Cisco Systems, Inc. San Jose, CA 95134-1706 USA

Asia Pacific Headquarters CiscoSystems(USA)Pte.Ltd. Singapore

Europe Headquarters CiscoSystemsInternationalBV Amsterdam,TheNetherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.



References

DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT