Cisco Nexus 9000 Series NX-OS Release Notes, Release 10.2(1)F

This document describes the features, issues, and exceptions of Cisco NX-OS Release 10.2(1)F software for use on Cisco Nexus 9000 Series switches.

The new Cisco NX-OS Software Release and Image-naming Convention information is available here -- Cisco NX-OS Software Strategy and Lifecycle Guide.

Note: The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.

Document Changes

DateDescription
May 05, 2023Added PTP in Unsupported Features on N9K-C92348GC section.
April 09, 2023Added caveat CSCwe67205 in Open Issues table.
February 3, 2023Updated Table 11 with N9K-C9336C-FX2 and N9K-C9336C-FX2-E switches.
January 25, 2023Updated the Unsupported Features on N9K-C92348GC section.
October 5, 2021Added details about ‘Thousand Eyes (TE) Integration' feature in the ‘New and Enhanced Software Features' section.
August 24, 2021Cisco NX-OS Release 10.2(1)F became available.

New and Enhanced Software Features

New Features

FeatureDescription
Smart Licensing Using PolicySmart Licensing Using Policy (SLP) is an enhanced version of Smart Licensing, which provides a licensing solution that does not interrupt the operations of your network and to enable a compliance relationship to account for the hardware and software licenses you purchase and use. SLP solution provides a seamless experience with various aspects of licensing such as purchase, use, report license usage to CSSM through Resource Utilization Measurement (RUM) report, and reconciliation. The only enforcement type supported is Unenforced or Not Enforced on Cisco Nexus 9000 and 3000 platform switches.
For more information see, Cisco Nexus NX-OS Smart Licensing Using Policy Guide, Release 10.2(x).
EVPN Hybrid IRB ModeIntroduced support for EVPN Hybrid IRB mode. This feature allows NX-OS VTEP devices operating in symmetric IRB mode to seamlessly integrate with asymmetric IRB VTEPs within the same fabric.
For more information, see Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 10.2(x).
Dense Wavelength-Division Multiplexing (DWDM) configurationIntroduced Dense Wavelength-Division Multiplexing (DWDM) configuration in Cisco Nexus 9000 Series switches.
For more information, see Cisco Nexus 9000 Series NX-OS Interface Configuration Guide, Release 10.2(x).
Thousand Eyes (TE) IntegrationIntroduced Thousand eyes integration support with Cisco Nexus 9000 Series switches.
For product overview look at: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/at-a-glance-c45-2431016.html
It is a must to install the following general SMU when TE integration is performed:
nxos.CSCvz52812-n9k_ALL-1.0.0-10.2.1.lib32_n9000.tar
nxos64.CSCvz52812-n9k_ALL-1.0.0-10.2.1.lib32_64_n9000.tar
For SMU installation please refer to the following guide: https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/102x/configuration/system-management/cisco-nexus-9000-series-nx-os-system-management-configuration-guide-102x/m-performing-software-maintenance-upgrades-10x.html

Enhanced Features

FeatureDescription
PBR: Default IPv4 Next HopProvides a mechanism to support inter-VRF routing. One of the ways to achieve inter-VRF routing is to specify the VRF where the next-hops to be resolved as part of set statement itself. This can be achieved through "set ip/ipv6 vrf next-hop" command.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
Enable/disable 'lacp suspend-individual' without port-channel 'shutdown'The [no] lacp suspend-individual configuration is allowed on port-channels which are in admin up state. This feature is supported on all Cisco Nexus 9000 platform switches.
For more information, see Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 10.2(x).
2 Stage CommitIntroduced show configuration command that displays the staged configurations. Also provides a 2 stage CLI commit wherein a confirm-commit model configurations get stored in a cli staging area and does not affect the switch running configuration until user issues a 'commit' cli.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
BFDAdded support for 2048 BFD sessions on Cisco Nexus 9300-EX, 9300-FX, 9300-FX2, 9300-FX3, 9300-GX platform switches.
For more information, see Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 10.2(x).
Cisco-av-pairBeginning with Cisco NX-OS Release 10.2(1)F, the shell:roles attribute in cisco-av-pair can be mentioned at beginning or at the end. LDAP does not support 'snmpv3' attributes.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
QoS -PFC ForwardingAdded support for Querying Interface Queuing Counters in Querying Interface and VLAN Counters and Statistics.
For more information, see Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide, Release 10.2(x).
Support for IS-IS support in DME for stats and oper dataAdded support for Querying IS-IS Statistics in IS-IS Operational Commands.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
Querying SVI Counters (SVI counters for unicast, mcast, broadcast packets and bytes counter)Added support for Querying SVI Counters in Querying Interface and VLAN Counters and Statistics.
For more information, see Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 10.2(x).
Hierarchical PKI with Multiple CAsProvides a facility to download CA bundles that could include several intermediate and root CAs.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
Model based Operations GNOI/NETCONF/RESTCONFThis feature adds trusted secure services and crypto ca import CLI for model based operations.
For more information, see Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 10.2(x).
Exclusive Terminal LockProvides CLIs to lock the terminal to allow one user to access the configure terminal commands. It prevents other users from changing the NX-OS running configuration.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
LACP PXEBeginning with Cisco NX-OS 10.2(1)F release, the [no] lacp suspend-individual pxe configuration supports PXE boot and prevents L2 loop due to server misconfiguration. This configuration allows only one port-channel member to be in individual (I) state for both regular port-channels and across vPC peers. This feature is supported on all Cisco Nexus 9000 platform switches.
For more information, see Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 10.2(x).
SFLOW BGP ExtensionThis feature adds configuring sFlow Extended BGP (Gateway) to the switch.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
Tap-agg feature and NDB licenseBeginning with Cisco NX-OS 10.2(1)F release, tap aggregation is a licensed feature that requires you to configure feature tap-aggregation so that you can configure the tap aggregation-related CLIs. This feature is supported on all Cisco Nexus 9000 series platform switches.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
L3 Netflow export on L2 physical interfaceBeginning with Cisco NX-OS 10.2(1)F release, you can define Layer 3 flow monitors on Layer 2 interfaces to cpature Layer 3 flow information on Layer 2 interfaces.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
MH-BFD over VXLANAdded support for BFD multihop over VXLAN on Cisco Nexus 9000 Series switches.
For more information, see Cisco Nexus 9000 NX-OS Interfaces Configuration Guide, Release 10.2(x).
OSPF SnmpTrap DMEizationThis feature provides support for DMEization for OSPFv2.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
DME Configuration - MulticastThis feature provides support for Configuring Fabric Multicast (ngmvpn).
For more information, see Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 10.2(x).
ERSPAN over IPv6Added support for ERSPAN over IPv6 on Cisco Nexus 9300 – EX, FX, FX2, FX3, GX family switches.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
NDB: Optimise ERSPAN implementationAdded support for inline ERSPAN header stripping from the incoming ERSPAN packets on NX-OS switch or NDB switch.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
Disable secure channel identifier (SCI)Beginning with Cisco Nexus Release 10.2(1)F, Secure Channel Identifier (SCI) can be disabled from MACSec security tag (SecTAG) on Cisco Nexus 9000 Series switches. The new CLI is "no include-sci".
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
OSPFv3 IPSec ESP EncryptionAdded support for configuring OSPFv3 encyrption at router level, area level, interface level, and virtual links. Also, provides support for configuring ESP IPSec.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
OSPFv3 ESP DMEizationAdded support for DMEization of OSPFv3 at router level, areal level, interface level, virtual links, and ESP.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
Enhanced ISSU support on FC NPV and FCoE NPV modeAdded enhanced ISSU support on FC NPV and FCoE NPV mode.
For more information, see Cisco Nexus 9000 Series NX-OS FC-NPV and FCoE-NPV Configuration Guide, Release 10.2(x).
VXLAN EVPN Downstream VNI and VXLAN IPv6 Underlay support for Nexus 9300v and Nexus 9500v platformsAdded VXLAN EVPN Downstream VNI and VXLAN IPv6 Underlay support for Nexus 9300v and Nexus 9500v platforms. Removed Nexus 9300v and 9500v platforms support for MPLS Segment Routing (SRv4).
For more information, see Cisco Nexus 9000v (9300v/9500v) Guide, Release 10.2(x).
Disable USB portsIntroduced a new CLI, "port usb disable" to disable USB ports on Cisco NX-OS switches.
For more information, see Cisco Nexus 9000 Series NX-OS Interface Configuration Guide, Release 10.2(x).
ESR: ITD NAT StatisticsBeginning with Cisco NX-OS Release 10.2(1)F, ITD supports NAT statistics. For Cisco Nexus N9K X9636C-RX and N9K X96160YC-R line cards, ITD statistics is not supported.
For more information, see Cisco Nexus 9000 Series NX-OS Intelligent Traffic Director Configuration Guide, Release 10.2(x).
PMN PIM passive ENATPMN supports Multicast-to-Unicast NAT in both PIM active and PIM passive modes.
For more information, see Cisco Nexus 9000 Series NX-OS IP Fabric for Media Solution Guide, Release 10.1(x).
PMN MU NATThe Multicast Service Reflection feature supports Multicast-to-Unicast translation only in egress mode.
For more information, see Cisco Nexus 9000 Series NX-OS IP Fabric for Media Solution Guide, Release 10.1(x).
ITD and ePBR - OTM and SLA APIsBeginning with Cisco NX-OS Release 10.2(1)F, ITD can use APIs to manage tracks created to monitor the interface and nodes status. ITD can use SLA APIs to create and delete sla_id for nodes.
For more information, see Cisco Nexus 9000 Series NX-OS Intelligent Traffic Director Configuration Guide, Release 10.2(x).
gNMI EnhancementsAdded support for the subscribe option mode for gNMI payload.
For more information, see Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 10.2(x).
Single 64-bit Image Support and 64-bit and 32-bit to 64-bit ISSUAdded 64-bit image support for Cisco Nexus 9000 series switches ending with - EX, -FX, -FX2, -FX3, -GX modules. 32-bit image support are provided for Cisco Nexus 9000 series with - R line cards.
For more information, see the Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 10.2(x).
DHCPv6 SMART RelayIntroduced DHCPv6 Smart Relay on Cisco Nexus 9000 Series switches.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
Secure Channel Identifier (SCI) OptionalityAdded MACsec support on Cisco Nexus N9K-X9716D-GX.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
Dynamic Access Control Lists (DACLs)From Cisco NX-OS Release 10.2(1)F, you can download per-user dynamic access control lists (DACLs) from the Cisco ISE Server as policy enforcement after authentication using IEEE 802.1X.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
No-Reload option for SMU installationProvides No-Reload option payloads for SMU installation.
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 10.2(x).
show itd brief DMEizationAdded support for Querying ITD Runtime Information.
For more information, see Cisco Nexus 9000 Series NX-OS ITD Configuration Guide, Release 10.2(x).
show epbr policy DMEizationAdded support for Querying ePBR Runtime Information.
For more information, see Cisco Nexus 9000 Series NX-OS ePBR Configuration Guide, Release 10.2(x).
Platform Telemetry of PSU, Fans, and Sensors.This feature provides support for platform telemetry of PSU, fans, and sensors.
For more information, see Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 10.2(x).
ITD and ePBR service optionsThis feature provides ITD and ePBR service options for IPv4 and IPv6 policies.
For more information, see Cisco Nexus 9000 Series NX-OS ITD Configuration Guide, Release 10.2(x).
FT/FTE for SR EncapsulationAdded support for MPLS SR encapsulation.
For more information, see Cisco Nexus 9000 Series NX-OS Label Switching Configuration Guide, Release 10.2(x).
Netflow Extension to support FTThis feature adds limitations for FX packet events and supports FT/FTE V9 feature.
For more information, see Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 10.2(x).
EVPN Distributed NATThis feature enables NAT on the leaf and spine in the VXLAN topology.
Inter VRF PBRAdded support for IPv4 or IPv6 next-hop address for policy-based routing, to load balance traffic across next-hop addresses, to enable next-hop ordering, and to drop packets instead of using default routing when the configured next hop becomes unreachable.
For more information, see Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide, Release 10.2(x).
Honour specified port numberAdded support to specify port numbers for SCP or SFTP and other protocols such as HTTPS, TFTP, and FTP. Enables you to copy files from/to an Nexus switch where the existing copy protocols are running on custom ports.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
Multicast Flow Path Visibility for TRM FlowsAdded Multicast Flow Path Visibility support for TRM L3 mode and underlay multicast. The Multicast Flow Path Visibility feature enables you to export all multicast states in a Cisco Nexus 9000 Series switch.
For more information, see Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 10.2(x).
POAP User-agentProvides provisioning details by verifying the HTTP GET function and validates the data from non-Cisco devices on to the Cisco's HTTP server so that the correct provisioning script is identified and used in provisioning.
For more information, see Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 10.2(x).
Multicast NAT: Multicast to UnicastAdded support for Multicast-to-Unicast NAT translation in egress mode.
For more information, see Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 10.2(x).
Tenant Routed Multicast (TRM) with IPv6 OverlayAdded support for TRM IPv6 in the overlay.
For more information, see Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 10.2(x).
TRM with vPC BGW and with Anycast BGWAdded TRM with vPC BGW and with Anycast BGW support on Cisco Nexus 9300-GX family switches.
For more information, see Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide, Release 10.2(x).
ESR: Support Flexible End Point Deployment (A-A) and multisiteWith this feature the interface on which the ePBR policy is applied can be on a different VRF than the VRF of each service in each of the service chains. Also, the ePBR supports port-channel sub-interfaces as the end-point interfaces.
For more information, see Cisco Nexus 9000 Series NX-OS ePBR Configuration Guide, Release 10.2(x).
Multicast NLB and GRE Consistency CheckAdded support for Multicast NLB and GRE Consistency Checker.
For more information, see Cisco Nexus 9000 Series NX-OS Troubleshooting Guide, Release 10.2(x).
Global Boundary Multicast ConfigurationAdded support for Global Boundary Multicast configuration.
For more information, see Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide, Release 10.2(x).
MACsec and MKA supportAdded support for MACsec and MKA on N9K-X9716D-GX module. Functionalities such as fallback, EAPOL, Macsec over breakout, and. global MACsec shutdown are also supported.
For more information, see Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 10.2(x).
ESR: PBR on Port-channel subinterfaceAdded ITD support for policy-based routing with Layer 3 portchannel ingress subinterfaces.
For more information, see Cisco Nexus 9000 Series NX-OS ITD Configuration Guide, Release 10.2(x).
OTM Commands DMEizationThe following OTM commands are DMEized in Cisco NX-OS Release 10.2(1)F:
1) track <object-id> list threshold weight
threshold weight {up < weight-val > [down <weight-val>]}
object <object-id> weight <weight-val>
[no] threshold weight {up <weight-val > [down <weight-val>]}
2) track <object-id> list threshold percentage
threshold percentage {up <percentage -val > [down <percentage -val>]}
[no] threshold percentage {up <percentage -val> [down <percentage -val>]}
3) track <object-id> {list {boolean <bool-val>}}
4) object <object-id> [not]
no object <object-id> [not]
5) vrf member {<vrf_name> | <vrf-known-name>}
no vrf member [<vrf_name> | <vrf-known-name>]

New Hardware Features

There are no new hardware features introduced in Cisco NX-OS Release 10.2(1)F.

Unsupported Features on N9K-C92348GC

Beginning with Cisco NX-OS Release 10.1(1), the following features are not supported on N9K-C92348GC.

  • VXLAN
  • SW/HW Telemetry
  • NetFlow/Analytics
  • iCAM
  • PTP
  • NX-SDK
  • DME, Device YANG, OpenConfig YANG, gRPC, NETCONF, RESTCONF

Note: NXAPI CLI and XML Agent (NETCONF over SSH) are supported on this platform.

Release Image

Cisco Nexus 9000 Series switches require 32-bit or 64-bit NX-OS image depending on the Cisco Nexus 9000 platforms.

Open Issues

Bug IDDescription
CSCvz39258Headline: Incorrect error message while appling IPv6 RA Guard Policy
Symptoms: While configuring IPV4 RA Guard Policy, if TCAM is not carved for IPV4 PACL [ifacl] region, general error message printed "Could not attach policy:" instead of more specific error message "Could not attach policy: IFACL TCAM not available, configure before enabling feature"
Workarounds: Verify if TCAM memory for ifacl region is carved. If not then carve TCAM for this region using this guide to carve TCAM. https://www.cisco.com/c/en/us/support/docs/switches/nexus-9000-series-switches/119032-nexus9k-tcam-00.html
CSCvx86007Headline: Intermittent Link Flaps observed with QSFP-100G-PSM4
Symptoms: Repeating flaps are seen on the links between Jericho linecard and Tahoe linecard, using CISCO-LUXTERA QSFP-100G-PSM4 rev B or C. The links recovers from the flap shortly and is stable for some time afterwards.
Workarounds: NA
CSCvy62175Headline: N9k Lacrosse Platforms - 100Gig link not coming up due to FEC
Symptoms: An operational 100Gig link on the switch goes down without any trigger after a flap and doesn't come up. The link could be using AOC cable or SR4 Optics. Replacing the Optics or cable doesn't help.When FEC is disabled on both ends using "no fec off", the link comes up.
Workarounds: Multiple workarounds:- Move to connection to an unused port on the switch- Disable FEC on both ends if acceptable- A reload of the switch can resolve the issue.
CSCvz28911Headline: N9K - Tap Aggr mode - Traffic no redirect after configure a new Port-channel to redirect port list
Symptoms: On NDB centralized using TAP Aggregation mode the traffic received on N9K EOR ingress Port-channel is not redirect to Port-channel on redirect port list.Issue started after configure a new Port-channel to the exist redirect port list.
Workarounds: Remove the new Port-channel from the redirect port list
CSCvz06811Headline: Nexus Data Broker switch floods IGMPv3 membership queries out of all input ports
Symptoms: IGMPv3 membership queries are flooded out of input ports
Workarounds: none
CSCvz35213Headline: BFD per-link causes flaps with multiple discriminators
Symptoms: BFD per-link may be unstable when one of the port-channel members is stuck in "XCVR not inserted".
Workarounds: Attempt to bring the stuck interface up.
CSCvz38543Headline: N9k Type-7 to Type-5 LSA translation is not happening when Link-ID is in host IP range
Symptoms: Issue is seen when type 7 LSA will be received with Link ID as host IP range.
Workarounds: None
CSCvz38944Headline: N9k DHCPv6 Relay breaks after IPv6 snooping is removed
Symptoms: Original Symptom from DHCPv6 Client perspective would be not receiving an IPv6 Address from the DHCPv6 server. CPU will only show the DHCPv6 solicit/Re-bind packets; Relay-FWD would NOT be originated by the n9k
Workarounds: Reload fixes the issue(shut/no-shut of the SVIs Dont seem to fix the problem)
CSCwe67205Headline: Credit Loss Recovery is not triggered for FC interface with no transmit credits.
Symptom: A Fibre Channel interface that stays at 0 transmit credits is not recovered by the Credit Loss Recovery agent.
Workaround: If the interface has switchport ignore bit-errors configured, then remove it with the no switchport ignore bit-errors interface configuration command.

Resolved Issues

Bug IDDescription
CSCuv49114Headline: ipAddressPrefix MIB returning wrong object
Symptoms: ipAddressPrefix MIB when being polled will return " ipAddressPrefixEntry" instead of " ipAddressPrefixOrigin"
Workarounds: NA
CSCvu64601Headline: High memory usage after streaming high volume of telemetry data for more than 6 days
Symptoms: A Nexus switch streaming high volume telemetry data may experience high memory usage which may eventually cause data collections to be dropped.
Workarounds: To prevent this issue from happening, configure higher sample-interval time value for subscriptions.If the issue is seen already on a Nexus switch, the problem can be resolved by disabling the telemetry feature via " no feature telemetry" and apply the configurations back.
CSCvy45581Headline: only one path returns event notifications for on-change sub with 2 xpaths that have same parent
Symptoms: There are couple issues with on-change notifications when subscribing to 2 xpaths in the same request (that belong to same parent).- Event notifications are not received for the second xpath subscribed. - For every single event, two notifications are received for the first xpath subscribed. I sent an on-change subscription with xpaths as:
?/System/intf-items/phys-items/PhysIf-list[id=eth1/4]/phys-tems/operSt/System/intf-items/phys-items/PhysIf-list[id=eth1/4]/phys-tems/operDescr Initial snapshot sent the notifications for both the operSt and operDescr paths followed by a sync_response. When an event is triggered for both the above paths, notification is received only for the operSt (the first xpath in the request) and not for the operDescr. Also, 2 notifications are received for every single event on operSt. Please refer to 'gnmi-console-logs' for more details.
Workarounds: subscribe from different channel
CSCvy53526Headline: Nexus 9000 : IP SLA log feature is not working
Symptoms: Nexus 9000 : IP SLA log feature is not working2021 Jun 1 15:24:43 N951 %ETHPORT-5-IF_UP: Interface Ethernet2/47 is up in Layer32021 Jun 1 15:24:55 N95-1 %SLA_SENDER-3-SNMP: rttMonCtrlAdminTag = (null)2021 Jun 1 15:26:05 N95-1 %SLA_SENDER-3-SNMP: rttMonCtrlAdminTag = (null)On 7.0(3)I7.X,2021 Jun 2 06:09:18 N9K-1 %SLA_SENDER-3-SNMP: rttMonCtrlAdminTag = (null)2021 Jun 2 06:09:18 N9K-1 %SLA_SENDER-3-IPSLATHRESHOLD: IP SLAs(10): Threshold Occurred for timeout>>>>Down2021 Jun 2 06:10:03 N9K-1 %SLA_SENDER-3-SNMP: rttMonCtrlAdminTag = (null)2021 Jun 2 06:10:03 N9K-1 %SLA_SENDER-3IPSLATHRESHOLD: IP SLAs(10): Threshold Cleared for timeout >>>>UP
Workarounds: None
CSCvy63631Headline: N9k: Can not delete ipv6 static bfd routes from running-config
Symptoms: Can not remove ipv6 static routes from running-configIt is very straightforward:
Switch(config)# show run | in "ipv6 route static bfd Vlan12 2001:xxxx:xx:xxxx:xx:xxx:0:xx" ipv6 route static bfd Vlan12 2001:xxxx:xx:xxxx:xx:xxx:0:xxSwitch(config)#
Switch(config)#
Switch(config)# no ipv6 route static bfd Vlan12 2001:xxxx:xx:xxxx:xx:xxx:0:xx Switch(config)# show run | in "ipv6 route static bfd Vlan12 2001:xxxx:xx:xxxx:xx:xxx:0:xx ipv6 route static bfd Vlan12 2001:xxxx:xx:xxxx:xx:xxx:0:xx <<<<!!!!!!!!!
Workarounds: Remove config from the box and edit it. And reboot the box with the new config.
CSCvy75027Headline: vPC VTEP use fabric anycast mac to promote ipv6 neighbor with VRRPv3 L3 External Connectivity
Symptoms: Fabric Anycast Gateway MAC is used as ipv6 ND Link-layer address with src mac of the VRRPV3 MAC.For exampleEthernet II, Src: VRRP MAC , Dst: HOST MAC...... ICMPv6 Option (Target link-layer address) Type: Target link-layer address (2) Length:
Link-layer address: Fabric Anycast Gateway MACIf L2 switch is connect behind VXLAN EVPN Layer 3 External Connectivity Link, you will see packet is flooded to both Master/Standby Nexus and cause duplicate due to VRRP MAC was learnt but the packet use Fabric Mac as dst MAC.
Workarounds: flap the VXLAN EVPN Layer 3 External Connectivity Link will make the traffic works for a while. Clear the IPV6 ND will reproduce the issue again
CSCvy90363Headline: 9500-R :: Feature ptp causes the spine switch to intercept unicast ARP replies in VxLAN fabric
Symptoms: The L2 adjacent host are not able to resolve each others ARP accross VxLan fabric.The broadcasted ARP reply is flooded correctly and reaches all hosts, however the unicast ARP reply is lost inside of the fabric.In fact the ARP replies are redirected to SPINE CPU instead of being forwarded.Other unicast communication works fine (eg. when we configure static ARPs)
Workarounds: So far three possible workarounds were identified0. Disable 'featue nv overlay' on Spine. This will avoid this problem and also will ensure better hashing of packets over ECMP links.1. Enable "arp suppression"or.2. Remove "feature ptp" from the SPINES. After doing so "reload" or "reload ascii" is required to restore connectivity
CSCvo17797Headline: Fan interrupts led to platform crash
Symptoms: platform crash and reload
Workarounds: none
CSCvo80791Headline: N9000 fails to process correctly fragmented traffic
Symptoms: Pings may fail when sent from bash shell if exceeding MTU of interface.
Workarounds: Send pings with size that does not exceed the MTU of the egress interface.
CSCvu67445Headline: N9k/Cloud Scale - Flood list missing po member port - broadcast traffic loss
Symptoms: Broadcast may not Tx an Ethernet port for VLAN's allowed for one of the port-channel member links.ARP request or any other form of ethernet broadcast may not reach destination. This would lead to no connectivity for affected hosts.Consistency check will report failure for VLAN membership:Example:show consistency-checker membership vlan 442hecking hardware for Module 1 Unit 0No FEX interfaces to validateConsistency Check: FAILED >>> Vlan:442, Hardware state consistent for: Ethernet1/41 Ethernet1/49 Ethernet1/50 Ethernet1/53 Vlan:442, Hardware state inconsistent for: Ethernet1/54</snip>
Workarounds: Enter shut/no shut (flap) the affected interface.Do not use the "port-channel port load-defer" command.
CSCvv09729Headline: Cisco Nexus 92348 back pressure results in PSU fan spinning wrong direction
Symptoms: The power supply exhaust fan may spin in the wrong direction on the Cisco Nexus 92348.
Workarounds: None
CSCvv93710Headline: TRM-MS Sanity Failure: Remove/Add EVPN Multisite Global Config on BGW
Symptoms: BGP may skip a routing update when the bestpath changes but all attributes of the new bestpath are the same as that of the old one. This will result in the old bestpath's peer not receiving an update to the new bestpath leading to potential black-holing of traffic. A secondary consequence is that the new bestpath's peer will *NOT* receive a withdrawal of the old bestpath leaving stale information in that peer
Workarounds: Issuing a "clear bgp <afi> <safi> soft out" to affected peers will address the issue
CSCvx23114Headline: Breakout interface flaps on certain ports associated with Cisco Nexus 9504/9508/9516 switch
Symptoms: Breakout interfaces may flap unexpectedly on the certain port for no apparent reason.
Workarounds: If breakout configuration is required - consider using other interfaces on the switch/linecard.
CSCvx36083Headline: Improve IPv4 pim address list hello option length validation
CSCvx59546Symptoms: If pim hello address list option is received with invalid length, including length 0, the hello is rejected. It is more appropriate and safer to just ignore the option.
Workarounds: At least one vendor is wrongfully sending the option with length 0. Configuring secondary IPv4 addresses may be a workaround, depending on the vendor's implementation.
CSCvx72007Headline: SNMP not reporting accurate stats for Macsec pktrate/octrate Objects
Symptoms: SNMP is not reporting accurate stats for the following:CISCO-SECY-EXTMIBcseSecyIfRxUncontrolledPktRate,cseSecyIfRxControlledPktRate,cseSecyIfTxUncont rolledPktRate,cseSecyIfTxControlledPktRatecseSecyIfRxControlledOctetRatecseSecyIf TxControlledOctetRatecseSecyIfRxUnControlledOctetRatecseSecyIfTxUnControlledOct etRate
Workarounds: Use these insteadCISCO-SECY-EXTMIBcseSecyIfRxControlledOctetcseSecyIfTxControlledOctetcseSecyIfRxUnControlled OctetcseSecyIfTxUnControlledOctet
CSCvx89804Headline: N9K using QSFP-40G-LR4-S and WSP-Q40GLR4L may cause High TX Alarm/Port Flapping
Symptoms: After upgrade to 9.3(5), 9.3(6) or 9.3(7) and using the QSFPs- QSFP-40G-LR4[-S] or WSP-Q40GLR4L may see High Tx Alarm and/or link flap.
Workarounds: None.
CSCvx89951Headline: vfprintf snmp related crash on nexus9k
Symptoms: +Service "snmpd" hasn't caught signal 11 seen+Core files generated for snmpd
Workarounds: tbd
CSCvy04038Headline: N9k Cloud Scale ASIC RWX drops not reported in ELAM Brief Report
Symptoms: ELAM Brief report not indicating RWX drops
Workarounds: Check ELAM report detail under following drop vector:*.STA_rwb_drop_vector_capture_access
CSCvy07815Headline: issues seen when gnmi/grpc connection with ipv6 default address connectivity
Symptoms: Inband GRPC connections, from front panel ports, to the loopback interface using IPv6 for transport fail. The loopback is not answering, i.e. connection refused, inbound IPv6 connections on the configured GRPC port.switch# show run grpc<snip>feature grpcgrpc use-vrf defaultgrpc certificate mytrustpointgrpc port 15000switch# show run interface lo0<snip>interface loopback0 ip address 1.1.1.1/32 ipv6 address 2001:1:1:1::1/32From management station:[user@localhost ~]$ telnet 2001:1:1:1::1 15000Trying 2001:1:1:1::1...telnet: connect to address 2001:1:1:1::1:
Workarounds: Before enabling GRPC for IPv6 transport, make sure that the Management interface is up/up and has IPv6 configured on it.switch# show run grpc ^% Invalid command at '^' marker.switch# switch# show run int mgmt 0<snip>interface mgmt0 vrf member management ip address 10.31.121.31/26 ipv6 address 2001::1/64switch(config)# feature grpcswitch(config)# grpc use-vrf defaultswitch(config)# grpc certificate mytrustpointswitch(config)# grpc port 15000From the management station:[user@localhost ~]$ telnet 2001:1:1:1::1 15000Trying 2001:1:1:1::1...Connected to 2001:1:1:1::1.Escape character is '^]'.^]telnet> qConnection closed.[user@localhost ~]$
CSCvy11663Headline: N9K EOR TxBitRate and/or RxBitRate on LC from FM are incorrect
Symptoms: The TxBitRate and/or RxBitRate from `show system internal interface counters peak` command will show a higher value (2-3x) greater on an LC than the traffic that it is actually receiving from the FM. When looking at the FM perspective using the same CLI command, the TxBitRate and RxBitRate for the corresponding internal interfaces are all correct.
Workarounds: Issue is cosmetic.If you want stats for the module do not run with "peak" command.Use "show system internal interface counters module X"
CSCvy11949Headline: Nexus switch may crash if CLI "show vdc" is entered after a downgrade of the NX-OS version
Symptoms: A Nexus switch may experience an unexpected reload of the VDC service if the command "show vdc" is executed.%SYSMGR-2-SERVICE_CRASHED: Service "vdc_mgr" (PID 31023) hasn't caught signal 11 (core will be saved).%SYSMGR-2HAP_FAILURE_SUP_RESET: Service "vdc_mgr" in vdc 1 has had a hap failure
Workarounds: Once we observe this issue need to do "write erase and reload" as workaround.
CSCvy13764Headline: bgp: RFC7854 BMP Peer RD not set
Symptoms: Received BMP messages do not contain "Peer RD" for VRF monitored peers.
Workarounds: No workaround.
CSCvy15010Headline: Cannot generate RSA keypair for AAA user accounts
Symptoms: Getting following error message when trying to generate RSA keypair from NXOS CLI for a AAA user account:Nexus9K(config)# username nxosadmin keypair generate rsa 2048 forceNexus9K(config)# oes not exist.Could not generate ssh key
Workarounds: N/A
CSCvy16482Headline: Packet drops when port-security is enabled on vPC with fabric peering
Symptoms: Packets are lost/drops for a host that is connected behind a vPC leg of a vPC pair that is configured with fabric peering. The switch does not log port-security violations or error logs related to the drop. Drops can be confirmed through ELAM capture with drop reason SECURE_MAC_MOVE. Example:module-1(TAH-elaminsel7)# reportHEAVENLY ELAM REPORT SUMMARYslot - 1, asic - 0, slice 0============================Incoming Interface: Eth1/60Src Idx : 0xed, Src BD : 666Outgoing Interface Info: met_ptr 0Packet Type: ARPDst MAC address: FF:FF:FF:FF:FF:FFSrc MAC address: CA:FE:CA:FE:CA:FE <<< This host is behind the vPC leg with port-securityTarget Hardware address: 00:00:00:00:00:00Sender Hardware address: CA:FE:CA:FE:CA:FETarget Protocol address: 192.0.2.15Sender Protocol address: 192.0.2..1ARP opcode: 1Drop Info:----------LUA:LUB:LUC:LUD: SECURE_MAC_MOVEFinal Drops: SECURE_MAC_MOVEvntag:vntag_valid :
0vntag_vir : 0vntag_svif : 0ELAM not triggered yet on slot - 1, asic - 0, slice - 1
Workarounds: Disable port-security on the vPC interface configuration of both vPC peers.
CSCvy23574Headline: N9K-C9348 port bringup timing delay
Symptoms: Various different server/host PID's reporting problems when reloads are needed for maintenance, patch upgrades, other. This delay may prevent the host from bringing up network applications needed for boot.
Workarounds: Hard coding only the speed at either 1 Gi or 100 M prevents the issue.
CSCvy24198Headline: L2FM process crash after l2fm_mcec_get_mac_handler
Symptoms: The L2FM process crashes after the vPC comes online:%$ VDC-1 %$ %ASCII-CFG-2-CONF_CONTROL: System ready%$ VDC-1 %$ %VPC-2PEER_KEEP_ALIVE_RECV_FAIL: In domain #, VPC peer keep-alive receive has failed%$ VDC-1 %$ %VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain #, VPC peer keep-alive receive has failed (message repeated 1 time)%$ VDC-1 %$ %VPC-2PEER_KEEP_ALIVE_RECV_FAIL: In domain #, VPC peer keep-alive receive has failed (message repeated 1 time)...%$ VDC-1 %$ %SYSMGR-2-SERVICE_CRASHED: Service "l2fm" (PID 7824) hasn't caught signal 11 (core will be saved).
Workarounds: Disconnect the vPC peer link and upgrade both peers separately. After they are both upgraded and the vPC is connected back, they should remain stable.
CSCvy29240Headline: All ports stop passing unicast traffic
Symptoms: No unicast traffic is passed through the switch, starting from one port, issue then replicates to other ports as well.
Workarounds: ++ Reload.++ If detected in early stages, shut/no shut of the problematic port would work.
CSCvy31399Headline: TAH "switchport mac-learn disable" does not fully work. CLI needs to be removed
Symptoms: %L2FM-2-L2FM_MAC_FLAP_RE_ENABLE_LEARN: will be present in the logs even when mac-learn disable is configured under the interface in which the MACs are being moved on
Workarounds: Change logging level to level 1 "logging level l2fm 1"
CSCvy32984Headline: ND ISSU | Q-in-VNI | Double tag due to system dot1q tunnel-transit command
Symptoms: dot1q tag is preserved after vxlan encapsulation for traffic received on a regular trunk port.
Workarounds: If triggered, a reload of the affected device will stop this behavior. To prevent this behavior, perform a disruptive upgrade.
CSCvy33411Headline: gnmi authentication with tacacs server fails if user is allowed only from a certain host
Symptoms: gnmi requests fail with 'Authentication error' when a specific policy on ISE is configured to allow the tacacs user authenticate only from a certain host.
Workarounds:
CSCvy33550Headline: Unsupported CLI `ip dhcp relay subnet-broadcast` needs to be completely removed from N9K (NOP)
Symptoms: Unsupported cli is still present (though hidden) on n9k -> ip dhcp relay subnet-broadcast
Workarounds: None. Remove unsupported CLI 'ip dhcp relay subnet-broadcast' from the configuration.CSCvc32697 Was previously filed for this issue but the CLI was not completely removed from code, only hidden. The CLI needs to be made a NO-OP
CSCvy33584Headline: N9K: nginx session flood if switch removed from DCNM with tracker enabled
Symptoms: As soon as switch is removed from DCNM, it becomes slow to respond and the sysinfo service crashes. Contrary to the log message, a core file may not be saved.%SYSMGR-2-SERVICE_CRASHED: Service "sysinfo" (PID 29474) hasn't caught signal 6 (core will be saved).Switch# run bashbash-4.3$ ps aux | grep nginx(Thousands of nginx_f worker sessions are printed in the format below)svc-nxa+ 5892 0.0 0.0 296772 5692 pts/14 Ss+ 15:21 0:00 nginx_f worker bash-4.3$ copy /volatile/nginx.log /bootflash/bash-4.3$ exitSwitch# show file bootflash:/nginx.log(Thousands of these entries are generated)_pterm_create_vsh_session:291 pid:5879 User sa-dcnm does not exists!pterm_get_vsh:810 pid:5879 couldn't create a vsh session
Workarounds: Disable the DCNM tracker feature in DCNM, before deprovisioning the switch.If the switch is already in this state, destroy the guestshell and reload the switch:Switch# guestshell destroySwitch# reload
CSCvy34356Headline: Nexus 9000 series running NX-OS 10.1(2) does not upgrade Golden EPLD region to new version.
Symptoms: On NxOS 10.1(X) upgrade of the EPLD Golden regions is sometimes unsuccessful. The device does not display any error when issuing the install command, instead it keeps booting from the Golden region with old EPLD version.
Workarounds: Upgrade EPLD on an earlier release of EPLD image that has same version as NX-OS 10.1(2) and then perform upgrade to NX-OS 10.1(2). Refer to the Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes for the specific releases.
CSCvy36107Headline: Improve pause timeout messages
Symptoms: Improve the current Nexus 9000 pause timeout messages so they are understandable and can be associated with the pause timeout feature.These are the current messages:<pre> 2021 Mar 26 11:58:30 n9k %TAHUSD-SLOT1-2TAHUSD_SYSLOG_CRIT: Ethernet1/29, slowdrain xoff hit ON (total xoff-hits:9) 2021 Mar 26 11:58:40 n9k %TAHUSD-SLOT1-2-TAHUSD_SYSLOG_CRIT: Ethernet1/29, slowdrain xoff hit OFF (last xoff-time:10 seconds) 2021 Mar 29 10:56:09 n9k %TAHUSD-SLOT1-2-TAHUSD_SYSLOG_CRIT: Ethernet1/29, slowdrain xoff hit ON (total xoff-hits:10) 2021 Mar 29 10:56:19 n9k %TAHUSD-SLOT1-2TAHUSD_SYSLOG_CRIT: Ethernet1/29, slowdrain xoff hit OFF (last xoff-time:10 seconds)</pre>
Workarounds: None.
CSCvy39404Headline: Packet loss after reload of VXLAN BGP EVPN vPC VTEP with eBGP underlay
Symptoms: Packet loss may be observed between hosts connected via vPC to vPC VTEPs in a VXLAN BGP EVPN fabric that uses eBGP as an underlay as one of the vPC VTEPs is coming online after a reload or power outage. Specifically, the packet loss starts after the vPC Delay Restore timer of the reloaded vPC peer expires. During this time, the NVE source loopback (that is, the loopback interface sourced with the "source-interface {interface}" command) is held in an Administratively Down state. The total duration of the packet loss will vary, but usually ranges from 60 seconds to several minutes depending on the precise vPC Delay Restore and NVE source loopback hold-down timers.
Workarounds: You can proactively avoid this issue by ensuring the NVE source loopback hold-down timer is set to a value less than the vPC Delay Restore timer.
CSCvy39858Headline: N9K-C9332C: Interfaces with 1Gbps transceivers do not go down when link signal is lost
Symptoms: If a Nexus 9332C switch with GLC-SX-MMD transceivers inserted in Ethernet1/33 or Ethernet1/34 has either interface come up/up when link signal is received, the interfaces will not transition to a down state when link signal is lost on either interface.
Workarounds: There is no known proactive workaround for this issue. To reactively work around this issue, you can administratively shut down the interface(s) on the affected device.
CSCvy40886Headline: N9K IPv6 NTP ACL missing from the configuration after reload ascii
Symptoms: An IPv6 NTP ACL is missing from the device configuraton after reload ascii.
Workarounds: N/A.
CSCvy45479Headline: Batch ACL config fail with duplicate ACE
Symptoms: ACL configuration is not as expected
Workarounds: 1. Remove duplicate ACE entries within each ACL in the custom startup configuration fileand/or2. Apply unique sequence number to each ACE within every ACL in custom startup configuration.
CSCvy50202Headline: N9K-C9364C - 9.3(7) + lxc boot mode - Fan speed stuck at 100%
Symptoms: + Fan speeds stuck at 100%
Workarounds: non lxc boot mode does not exhibit this behavior.
CSCvy51761Headline: Errdisable recovery - reinit-no-flap being enabled after upgrade from 9.2(x) --- > 9.3(x)
Symptoms: - After upgrade from 9.2(4) version to 9.3(7) reinit-no-flap is enabled in case of errdisable recovery.- Trigger for reinit-no-flap being enabled in 9.3(7) version looks to be "errdisable recovery cause dcbx-no-ack" being enabled in 9.2(4).- "errdisable recovery cause dcbx-no-ack" cannot be removed after the upgrade to 9.3(7)- even if "reinit-no-flap" is shown in 9.3(7) as enabled the feature looks to be not working#show errdisable recovery reinit-no-flap
enabled <-------
dcbx-error
enabled <-------vlan-membership-erro
enabled
pause-rate-limit
disabled inline-power
enabled sw-failure
disabled #show run | inc errerrdisable recovery cause dcbx-no-ack#no errdisable recovery cause dcbx-no-ackCreate-only and naming props cannot be modified after creation, class=ethpmEvent, prop=event
Workarounds: - Downgrade back to 9.2(x) and remove " errdisable recovery cause dcbx-no-ack" from running configuration, then reload.- Simple reload in 9.3(x) release looks to be not solving problem.
CSCvy55293Headline: IPinIP packets dropped on the peer-link
Symptoms: IP-in-IP tunnelled traffic may fail when forwarded from one leaf to another over vpc peer-link in a vxlan environment.There is no impact for GRE traffic
CSCvy57340Workarounds: Adjust routing preferences to forward such traffic locally on the switch instead of crossing peer-link.
CSCvy62164Headline: FIPs mode enabled+ nxapi disabled: switch reload allows access to nginx/nxapi sandbox port 80,443
Symptoms: 1. Switch reports ports 80 and 443 are open despite feature nxapi disabledTDC1P1-Rack01-BMC-1# show sockets connection tcp | in '*(80)|*(443)' n 1[host]: tcp LISTEN 0 *(80) <<< port should be closed Wildcard 0 *(*)--[host]: tcp6 LISTEN 0 *(80) <<< port should be closed Wildcard 0 *(*)--[host]: tcp LISTEN 0 *(443) <<< port should be closed Wildcard 0 *(*)--[host]: tcp6 LISTEN 0 *(443) <<< port should be closed Wildcard 0 *(*)2. user admin with valid password can open browser to NXAPI Sandbox despite feature disabled3. with feature bash enabled, find that nginx process was restarted, despite feature nxapi disabledTDC1P1-Rack01-BMC-1# run bash sudo pgrep -l nginx12616 nginx14059 nginx_1_fe14138 nginx_1_fe
Workarounds: In this scenario an ACL can be used on mgmt0 interface to prevent access to the 80 & 443 service. Example:!ip access-list DENY-NXAPI 10 deny tcp any any eq 443 20 deny tcp any any eq www 30 permit ip any any !interface mgmt0 ip access-group DENY-NXAPI in!Note: There are normally restrictions when using an ACL with NX-API when it is configured to use a VRF. See https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/101x/programmability/cisco-nexus-9000-series-nx-osprogrammability-guide-release-101x/m-n9k-nx-api-cli-101x.html section "Restricting Access to NX-API" for more details. For the purposes of this defect and workaround those limitations are not applicable.
CSCvy67232Headline: Crash in N9K Fatal Module Error when downgrade - service port_client hap reset
Symptoms: During downgrade from 9.3.7 to 9.3.6, vPC peer switch reloads due to "port_client" service crash:Service: port_clientDescription: Port Client DaemonExecutable: /lc/isan/bin/port_client
Workarounds: No workaround. The switch is reloaded when the issue is hit.
CSCvy67509Headline: %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "fcoelc" (PID 25997) hasn't caught signal 11
Symptoms: The service "fcoelc" crashes on a Cisco N9k that has a FCoE link. A core file will be generated due to the event.From NVRAM logs:%SYSMGR-SLOT1-2SERVICE_CRASHED: Service "fcoelc" (PID 25997) hasn't caught signal 11 core will be savedConfiguration changes were applied on QoS prior to the crash. Also can observe errors related to QoS and the frames received:%ACLQOS-SLOT1-2ACLQOS_UNEXPECTED_PFC_FRAMES: Ethernet1/29 received 2 unexpected PFC frames for COS 4%ACLQOS-SLOT1-2-ACLQOS_UNEXPECTED_PFC_FRAMES: Ethernet1/29 received 2 unexpected PFC frames for COS 5%ACLQOS-SLOT1-2ACLQOS_UNEXPECTED_PFC_FRAMES: Ethernet1/29 received 2 unexpected PFC frames for COS 6%ACLQOS-SLOT1-2-ACLQOS_UNEXPECTED_PFC_FRAMES: Ethernet1/29 received 2 unexpected PFC frames for COS 7%SYSMGR-SLOT1-2SERVICE_CRASHED: Service "fcoelc" (PID 25997) hasn't caught signal 11 (core will be saved).
Workarounds: none
CSCvy68524Headline: Watchdog timeout reason may not be saved due to race condition
Symptoms: After watchdog timeout reset there are no kernel logs or stack-traces available to determine a reason of the timeout, and reset-reason indicates that kernel did not receive NMI:----- reset reason for module 1 (from Supervisor in slot 1) ---1) At 123456 usecs after Sun May 01 01:02:00 2021 Reason: Watchdog Timeout Service: HW check by card-client Version:"HW check by card-client" indicates that Kernel either didn?t receive NMI or kernel didn?t able to write the reset reason section.
Workarounds: None
CSCvy72704Headline: Aclqos crash on ravl_insert and ravl_free
Symptoms: aclqos process crash2021 Jun 8 03:35:29.789 RMD03-NX_LB-01 %$ VDC-1 %$ %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "aclqos" (PID 28000) hasn't caught signal 11 (core will be saved).2021 Jun 8 03:35:30.407 RMD03-NX_LB01 %$ VDC-1 %$ %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "aclqos" (PID 8248) hasn't caught signal 11 (core will be saved).2021 Jun 8 03:35:31.026 RMD03NX_LB-01 %$ VDC-1 %$ %SYSMGR-SLOT1-2-SERVICE_CRASHED: Service "aclqos" (PID 8469) hasn't caught signal 11 (core will be saved).2021 Jun 8 03:35:31.640 RMD03-NX_LB-01 %$ VDC-1 %$ %SYSMGR-SLOT1-2SERVICE_CRASHED: Service "aclqos" (PID 8477) hasn't caught signal 11 (core will be saved)May also see the TCAM resource exhaustion logs like below-2021 May 22 18:47:26.685 RMD03-NX_LB-01 %$ VDC-1 %$ %ACLQOS-SLOT1-2ACLQOS_OOTR: Tcam resource exhausted: Ingress RACL [ing-racl]2021 May 22 18:47:26.713 RMD03-NX_LB-01 %$ VDC-1 %$ %RPM-2-PPF_SES_VERIFY: rpm [31668] PPF session verify failed in client aclqos(Line card 1/VDC NONE/UUID 366) with an error 0x41040069(Sufficient free entries are not available in TCAM bank)2021 May 22 18:48:47.213 RMD03-NX_LB-01 %$ VDC-1 %$ %ACLQOS-SLOT1-2ACLQOS_OOTR: Tcam resource exhausted: Ingress RACL [ing-racl]2021 May 22 18:48:47.240 RMD03-NX_LB-01 %$ VDC-1 %$ %RPM-2-PPF_SES_VERIFY: rpm [31668] PPF session verify failed in client aclqos(Line card 1/VDC NONE/UUID 366) with an error 0x41040069(Sufficient free entries are not available in TCAM bank)2021 May 22 18:51:05.725 RMD03-NX_LB-01 %$ VDC-1 %$ %ACLQOS-SLOT1-2ACLQOS_OOTR: Tcam resource exhausted: Ingress RACL [ing-racl]2021 May 22 18:51:05.749 RMD03-NX_LB-01 %$ VDC-1 %$ %RPM-2-PPF_SES_VERIFY: rpm [31668] PPF session verify failed in client aclqos(Line card 1/VDC NONE/UUID 366) with an error 0x41040069(Sufficient free entries are not available in TCAM bank)2021 May 22 20:28:43.847 RMD03-NX_LB-01 %$ VDC-1 %$ %ACLQOS-SLOT1-2ACLQOS_OOTR: Tcam resource exhausted: Ingress RACL [ing-racl]2021 May 22 20:28:43.909 RMD03-NX_LB-01 %$ VDC-1 %$ %RPM-2-PPF_SES_VERIFY: rpm [31668] PPF session verify failed in client aclqos(Line card 1/VDC NONE/UUID 366) with an error 0x41040069(Sufficient free entries are not available in TCAM bank)
Workarounds:
CSCvy73232Headline: NX-API Object Store DN/Class Properties Inconsistent with CLI for Vlans that Previously Existed
Symptoms: In object store / visore from NXAPI:BdOperName is blank, operSt shows downIf vlan 12 is removed and then added again with name TEST-VLAN (or any other name), we see the following in object store: BdOperName ----> blank (no output here in visore / object store)operStdown ----> why is this not active? nameTEST-VLAN --> name is populated with the name that I gave, but why is BdOperName blank? ++ It does not matter what method is used to add / delete the vlan. The result is the same as listed above.++ Reloading the switch causes all the above fields to be populated correctly / as expected. Ie; BdState ==================================Test Switch output: ==================================BMO-EQNY4-NX02(config)# sh vl brVLAN Name Status Ports---- ------------ -------------------- --------- -------------------------------1 default active Eth1/212 TEST-VLAN active Eth1/2We can see the vlan is active and functioning correctly so why is BdState down? ++ This is causing problems for my customer because they use scripting to check on vlan status and this erroneous output gives false flags (vlan seems inactive when it is active).
Workarounds: Reload the switch
CSCvy74199Headline: N9k ITD-NAT and User defined PBR applied to same interface may cause inconsistencies in aclqos table
Symptoms: ITD NAT Traffic sent to node with Incorrect DMACaclqos is mis-matched b/w ASIC instances
Workarounds: If feasible, remove PBR from the SVI(copy run start) and affected nexus 9k would have to be reloaded with "reload ascii"
CSCvy76019Headline: OSPFv2 Auth key need to be relaxed
Symptoms: OSPFv2 authentication commands with some type-7 passwords are not accepted from release 9.3.5 onward."ip ospf message-digest-key 100 md5 7 <password>" "ip ospf authentication-key 7 <password>If password violates below rules then that will not be accepted. i.) First four characters are numbers.ii.) Password length should be a multiple of 4.iii.) Max length can be 32 characters.This is incompatible with older releases which followed below rule.i.) Input must contain an even number of characters and minimum length is 4ii.). The first two digits must be decimal numbers and the rest are hexThis will cause failure of the command on upgrade (ISSU, reload etc).
Workarounds: Before upgrade change the keys to follow below rules:i.) Input must contain an even number of characters and minimum length is 4ii.). The first two digits must be decimal numbers and the rest are hex
CSCvy88454Headline: N9K - Mgmt0 RJ45 copper port goes down, once SFP is inserted on SFP port
Symptoms: Mgmt0 port on a Cisco Nexus 9000 Series switch goes down and doesn't come back up.1.connect both of the RJ45 and SFP based mgmt port.2. remove the cable on the SFP based mgmt port.3.shut/no shut the mgmt port.
Workarounds: Setting the speed to 100 fixes the problem or removing the SFP from the SFP mgmt0 port brings up the RJ-45 port.
CSCvy89592Headline: Packets forwarded with Incorrect MPLS labels when using N9k layer 2 evpn over segment routing
Symptoms: Spines drop the Labeled Packets from Leaf switchesIncorrect Outer label for MPLS packetsIn some cases, multiple labels are also seen(more than 2)
Workarounds: Once impacted by this defect, the only way to restore is by Removing SPAN/SFLOW(if feasible) and "copy run start", reload
CSCvy94454Headline: N9K/FX Series - Egress IFACL Label allocation Exhaustion/Failure is handled incorrectly
Symptoms: When Egress IFACL label allocation is reached; BFD flaps or traffic gets policed on port where egress QOS policy (policer) is not configured.
Workarounds: Do not apply policies on more than supported Hardware limitRemove the policy from an interface.
CSCvy97053Headline: Multiple sh process cores being created
Symptoms: Device will get multiple sh cores created:`show cores`VDC Module Instance Process-name PID Date(Year-Month-Day Time)--- ------ -------- --------------- -------- -------------------------1 1 1 sh 17791 2021-06-25 13:28:591 1 1 sh 17820 2021-06-25 13:29:071 1 1 sh 17804 2021-06-25 13:30:01
Workarounds: none
CSCvy99573Headline: N9508 sub-interface Tx counters are not incrementing.
Symptoms: N9508 sub-interface Tx counters are not incrementing.
Workarounds: Downgrade to 9.2(x) version.
CSCvz02714Headline: PBR not correctly programmed with scaled L2 egress port-channel
Symptoms: With PBR redirected to a next hop adjacent via a L2 port-channel, the PBR can become mis-programmed and blackhole traffic.May be observed when initially configuring or when adding links to an already provisioned port-channel.
Workarounds: Constrain port-channel to 31 ports or less
CSCvz07339Headline: When having PVLAN promiscuous on trunk link BFD and ISIS not coming up
Symptoms: Current config of 2 N9K-C93180YC-FX connected back to back with a trunk link with a combination of PVLAN, ISIS and BFD configuration.++ When the PO1 is configured as "Switchport mode trunk" , both the BFD and ISIS comes up.++ When the PO1 is configured as "switchport mode private-vlan trunk promiscuous", BFD goes down and ISIS adjacency goes down.++ However, when we configure "OSPF" as a testing purpose, under the same SVI VLAN 14, it comes up fine.N9k-1 <--trunk--> N9k-2N9k-1interface port-channel1 switchport switchport mode private-vlan trunk promiscuous switchport private-vlan trunk allowed vlan 1,10,14,200- 201,250,300,350,500 switchport private-vlan mapping trunk 250 251-257 switchport private-vlan mapping trunk 300 301-307 switchport private-vlan mapping trunk 14 15 switchport trunk native vlan 10 switchport trunk allowed vlan 1,10,14,200- 201,250,300,350,500N9k-2interface port-channel1 switchport switchport mode private-vlan trunk promiscuous switchport private-vlan trunk allowed vlan 1,10,14,200-201,250,300,350,500 switchport private-vlan mapping trunk 250 251- 257 switchport private-vlan mapping trunk 300 301-307 switchport private-vlan mapping trunk 14 15 switchport trunk native vlan 10 switchport trunk allowed vlan 1,10,14,200-201,250,300,350,500IS-IS process: ISIS VRF: defaultIS-IS adjacency database:Legend: '!': No AF level connectivity in given topologySystem ID SNPA Level State Hold Time Interface2081.1609.5018 4c71.0d24.1d67 2 INIT 00:00:45 Vlan14F340.12.19-93180FX-9FD# sh bfd neOurAddr NeighAddr LD/RD RH/RS Holdown(mult) State Int Vrf 10.127.94.35 10.127.94.34 1090519057/0 Down N/A(3) Down Vlan14 default
Workarounds: a. Provision a dedicated L2 trunk port (non PVLAN) between the switches.b. Remove BFD itself entirely for the time being to have isis adjacency - no feature BFD
CSCvz07646Headline: sysDescr doesnt return hardware type for Nexus9000
Symptoms: sysDescr doesn't return with snmp hardware type that includes "Nexus 9000" string. According to OID description we should return the system's hardware type. Example:Non-working one:SNMPv2-MIB::sysDescr.0 = STRING: Cisco NXOS(tm) nxos.9.3.2.bin, Software (nxos), Version 9.3(2), RELEASE SOFTWARE Copyright (c) 2002-2019 by Cisco Systems, Inc. Compiled 10/28/2019 22:00:00Working one displaying hardware type:SNMPv2-MIB::sysDescr.0 = STRING: Cisco NX-OS(tm) n7000, Software (n7000-s2-dk9), Version 8.2(4), RELEASE SOFTWARE Copyright (c) 2002-2019 by Cisco Systems, Inc. Compiled 5/31/2019 23:00:00
Workarounds: None
CSCvz08309Headline: LXC Mode ND ISSU wont upgrade Micron500IT firmware
Symptoms: LXC boot mode with ND ISSU wont upgrade Micron500IT firmware for FN72150
Workarounds: Use script mentioned in fn72150 upgrade it manuallyDisable LXC mode and do reload
CSCvz09834Headline: N9500-R/N3600 CoPP policer counters are incorrect after upgrade to 9.3.7
Symptoms: CoPP policer counters across all classes are incorrect.
Workarounds: N/A
CSCvz11134Headline: N9500-R/N3600 ttl=1 mcast traffic impacts link-local mcast control-plane
Symptoms: Flapping link-local mcast based neighbor-ship (OSPF).
Workarounds: Eliminate TTL=1 traffic.
CSCvz17536Headline: Traffic blackhole when both uplinks of compute to ToR are flapped
Symptoms: Setup is CVIM running 3.4.4 with N9K ToR pairs running 9.3.7 Compute Nodes <--> Leaf pair <---> Spines <----> ECX ( Juniper) <--->CE (Juniper)When both uplinks from Compute to ToR pair are flapped , traffic is blackholed.
Workarounds: Ping compute VTEP IP from ECX node or Leaf node OR restart VPP on compute node.
CSCvx70658Headline: 100G SFP's starting with FBN S/N reported as 40G-SR4
Symptoms: FCOT read failures causing display issue of 100G SFP's as 40G-SR4's
Workarounds: Reload
CSCvy66586Headline: External Error Message for 36180-YC-R uses Fretta in message
Symptoms: This is a document bug, or error message correction bug that has been brought to the technical teams attention.
Workarounds: None
CSCvy90700Headline: Mac address disabled on ports after removing VPC Peer-link from configuration
Symptoms: After removing VPC peer-link from configuration router mac addresses from VPC peer will not be learnt agan.If using BFD you can see he following error under: sh bfd neighbors detail: sh bfd neighbors details OurAddr NeighAddr LD/RD RH/RS Holdown(mult) State Int Vrf Type 10.3.200.254 10.3.200.253 1090519044/0 Down N/A(3) Down Vlan200 default SH Session state is Down and not using echo functionSession type: SinglehopLocal Diag: 0, Demand mode: 0, Poll bit: 0, Authentication: NoneMinTxInt: 0 us, MinRxInt: 0 us, Multiplier: 0Received MinRxInt: 0 us, Received Multiplier: 0Holdown (hits): 0 ms (0), Hello (hits): 0 ms (0)Rx Count: 0, Rx Interval (ms) min/max/avg: 0/0/0 last: 0 ms agoTx Count: 0, Tx Interval (ms) min/max/avg: 0/0/0 last: 0 ms agoRegistered protocols: ospfDowntime: 0 days 0 hrs 1 mins 28 secs, Downcount: 0Last packet: Version: 0 - Diagnostic: 0 State bit: AdminDown - Demand bit: 0 Poll bit: 0 - Final bit: 0 Multiplier: 0 - Length: 24 My Discr.: 0 - Your Discr.: 0 Min tx interval: 0 - Min rx interval: 0 Min Echo interval: 0 - Authentication bit: 0 Hosting LC: 0, Down reason: No Diagnostic, Reason not-hosted: if_index type invalid <<<<<<<<<<<<
Workarounds: Reload the box can solve the issue.
CSCvy49381Headline: QOSMGR_MEM_port_grp_mem_t memory leak in the ipqosmgr process
Symptoms: Crash of ipqosmgr process due to a memory leak with core and process log files.%SYSMGR-2-SERVICE_CRASHED: Service "ipqosmgr" (PID 32142) hasn't caught signal 6 (core will be saved).
Workarounds: Not known for now.
CSCvz36338Headline: N9K-C9364C: 100g copper link with macseec config does not link up on port-flap intermittently
Symptoms: With macsec config, link may not come up on 100G copper connection after repeated shut/no shut on ports 49-64.
Workarounds: Reload the switch.

General/Known Issues

Bug IDDescription
CSCvz07339Earlier the SysDescr did not return with snmp hardware type that includes "Nexus 9000" string. From Cisco NX-OS Release 10.2(1)F SysDescr MIB Information includes the Hardware Type (Nexus9000) and PID Information. An example is provided below.
iso.3.6.1.2.1.1.1.0 = STRING: "Cisco NX-OS(tm) Nexus9000 C9348GC-FXP, Software (NXOS 64-bit), Version 10.2(1), Interim version 10.2(0.229), RELEASE SOFTWARE Copyright (c) 2002-2021 by Cisco Systems, Inc. Compiled 7/22/2021 21:00:00"
NAOpen Flow is not supported in Cisco Nexus 9000 Series switches.
NAFM-G modules in slot-25 might fail to come up if N9K-X9736C-FX, N9K-X9736Q-FX line cards are in up state.
NAIngress packets above 626 bytes are truncated in a Span on Drop (SoD) scenario in Nexus 9300-GX Platform Switches.
NAWhen you downgrade from Cisco NX-OS Release 10.2(1)F to an earlier version (for example Cisco NX-OS Release 9.3(5)) you will receive a compatibility failure unless you delete DES from the snmp-server command. Cisco NX-OS Release 9.3(5) supports only AES. But when you remove DES from the snmp-server command, it changes the admin password that cannot be easily deciphered. You need to add a new user so that you can change the admin password, which then synchronizes it with the snmp-server password.

Device Hardware

The following tables list the Cisco Nexus 9000 Series hardware that Cisco NX-OS Release 10.2(1)F supports. For additional information about the supported hardware, see the Hardware Installation Guide for your Cisco Nexus 9000 Series device.

Table 1. Cisco Nexus 9500 Switches
Product IDDescription
N9K-C95047.1-RU modular switch with slots for up to 4 line cards in addition to two supervisors, 2 system controllers, 3 to 6 fabric modules, 3 fan trays, and up to 4 power supplies.
N9K-C950813-RU modular switch with slots for up to 8 line cards in addition to two supervisors, 2 system controllers, 3 to 6 fabric modules, 3 fan trays, and up to 8 power supplies.
N9K-C951621-RU modular switch with slots for up to 16 line cards in addition to two supervisors, 2 system controllers, 3 to 6 fabric modules, 3 fan trays, and up to 10 power supplies.
Table 2. Cisco Nexus 9500 Cloud Scale Line Cards
Product IDDescriptionMaximum Quantity
Cisco Nexus 9504Cisco Nexus 9508Cisco Nexus 9516
N9K-X9716D-GXCisco Nexus 9500 16-port 400-Gigabit Ethernet QSFP line card48N/A
N9K-X9736C-FXCisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card4816
N9K-X9788TC-FXCisco Nexus 9500 48-port 1/10-G BASE-T Ethernet and 4-port 40/100 Gigabit Ethernet QSFP28 line card4816
N9K-X97160YC-EXCisco Nexus 9500 48-port 10/25-Gigabit Ethernet SFP28 and 4-port 40/100 Gigabit Ethernet QSFP28 line card4816
N9K-X9732C-FXCisco Nexus 9500 32-port 40/100 Gigabit Ethernet QSFP28 line card4816
N9K-X9732C-EXCisco Nexus 9500 32-port 40/100 Gigabit Ethernet QSFP28 line card4816
N9K-X9736C-EXCisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card4816
Table 3. Cisco Nexus 9500 R-Series Line Cards
Product IDDescriptionMaximum Quantity
Cisco Nexus 9504Cisco Nexus 9508
N9K-X9636C-RCisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card48
N9K-X9636C-RXCisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line card48
N9K-X9636Q-RCisco Nexus 9500 36-port 40 Gigabit Ethernet QSFP line card48
N9K-X96136YC-RCisco Nexus 9500 16-port 1/10 Gigabit, 32-port 10/25 Gigabit, and 4-port 40/100 Gigabit Ethernet line card48
N9K-X9624D-R2Cisco Nexus 9500 24-port 400 Gigabit QDD line cardNot supported8
Table 4. Cisco Nexus 9500 Cloud Scale Fabric Modules
Product IDDescriptionMinimumMaximum
N9K-C9504-FM-ECisco Nexus 9504 100-Gigabit cloud scale fabric module45
N9K-C9504-FM-GCisco Nexus 9500 4-slot 1.6Tbps cloud scale fabric module45
N9K-C9508-FM-ECisco Nexus 9508 100-Gigabit cloud scale fabric module45
N9K-C9508-FM-E2Cisco Nexus 9508 100-Gigabit cloud scale fabric module45
N9K-C9508-FM-GCisco Nexus 9500 8-slot 1.6Tbps cloud-scale fabric module45
N9K-C9516-FM-E2Cisco Nexus 9516 100-Gigabit cloud scale fabric module45
Table 5. Cisco Nexus 9500 R-Series Fabric Modules
Product IDDescriptionMinimumMaximum
N9K-C9504-FM-RCisco Nexus 9504 100-Gigabit R-Series fabric module46
N9K-C9508-FM-RCisco Nexus 9508 100-Gigabit R-Series fabric module46
N9K-C9508-FM-R2Cisco Nexus 9508 400-Gigabit R-Series fabric module46
Table 6. Cisco Nexus 9500 Supervisor Modules
SupervisorDescriptionQuantity
N9K-SUP-A1.8-GHz supervisor module with 4 cores, 4 threads, and 16 GB of memory2
N9K-SUP-A+1.8-GHz supervisor module with 4 cores, 8 threads, and 16 GB of memory2
N9K-SUP-B2.2-GHz supervisor module with 6 cores, 12 threads, and 24 GB of memory2
N9K-SUP-B+1.9-GHz supervisor module with 6 cores, 12 threads, and 32 GB of memory2

Note: N9K-SUP-A and N9K-SUP-A+ are not supported on Cisco Nexus 9504 and 9508 switches with -R line cards.

Table 7. Cisco Nexus 9500 System Controller
Product IDDescriptionQuantity
N9K-SC-ACisco Nexus 9500 Platform System Controller Module2
Table 8. Cisco Nexus 9500 Fans and Fan Trays
Product IDDescriptionQuantity
N9K-C9504-FANFan tray for 4-slot modular chassis3
N9K-C9504-FAN2Fan tray that supports the Cisco N9K-C9504-FM-G fabric module3
N9K-C9508-FANFan tray for 8-slot modular chassis3
N9K-C9508-FAN2Fan tray that supports the Cisco N9K-C9508-FM-G fabric module3
N9K-C9516-FANFan tray for 16-slot modular chassis3
Table 9. Cisco Nexus 9500 Fabric Module Blanks with Power Connector
Product IDDescriptionMinimumMaximum
N9K-C9504-FAN-PWRNexus 9500 4-slot chassis 400G cloud scale fan tray power connector12
N9K-C9508-FAN-PWRNexus 9500 4-slot chassis 400G cloud scale fan tray power connector12
Table 10. Cisco Nexus 9500 Power Supplies
Product IDDescriptionQuantityCisco Nexus Switches
N9K-PAC-3000W-B3 KW AC power supplyUp to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PDC-3000W-B3 KW DC power supplyUp to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PUV-3000W-B3 KW Universal AC/DC power supplyUp to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PUV2-3000W-B3.15-KW Dual Input Universal AC/DC Power SupplyUp to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
Table 11. Cisco Nexus 9200 and 9300 Switches
Cisco Nexus SwitchDescription
N9K-C9316D-GX1-RU switch with 16x400/100/40-Gbps ports.
N9K-C9364C-GX2-RU fixed-port switch with 64 100-Gigabit SFP28 ports.
N9K-C93600CD-GX1-RU fixed-port switch with 28 10/40/100-Gigabit QSFP28 ports (ports 1-28), 8 10/40/100/400-Gigabit QSFP-DD ports (ports 29-36)
N9K-C9364C2-RU Top-of-Rack switch with 64 40-/100-Gigabit QSFP28 ports and 2 1-/10-Gigabit SFP+ ports.
- Ports 1 to 64 support 40/100-Gigabit speeds.
N9K-C9332C- Ports 49 to 64 support MACsec encryption.
- Ports 65 and 66 support 1/10 Gigabit speeds.
1-RU fixed switch with 32 40/100-Gigabit QSFP28 ports and 2 fixed 1/10-Gigabit SFP+ ports.
N9K-C93180YC-FX348 1/10/25 Gigabit Ethernet SFP28 ports (ports 1-48)
6 10/25/40/50/100-Gigabit QSFP28 ports (ports 49-54)
N9K-C93180YC-FX3S48 1/10/25 Gigabit Ethernet SFP28 ports (ports 1-48)
6 10/25/40/50/100-Gigabit QSFP28 ports (ports 49-54)
N9K-C9336C-FX2-E1-RU switch with 36 40-/100-Gb QSFP28 ports
N9K-C9336C-FX21-RU switch with 36 40-/100-Gb Ethernet QSFP28 ports
N9K-C93360YC-FX22-RU switch with 96 10-/25-Gigabit SFP28 ports and 12 40/100-Gigabit QSFP28 ports
N9K-C93240YC-FX21.2-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP28 fiber ports and 12 40-/100-Gigabit Ethernet QSFP28 ports.
N9K-C93216TC-FX22-RU switch with 96 100M/1G/10G RJ45 ports, 12 40/100-Gigabit QSFP28 ports, 2 management ports (one RJ-45 and one SFP port), 1 console, port, and 1 USB port.
N9K-C93180YC-FX1-RU Top-of-Rack switch with 10-/25-/32-Gigabit Ethernet/FC ports and 6 40-/100-Gigabit QSFP28 ports. You can configure the 48 ports as 1/10/25-Gigabit Ethernet ports or as FCoE ports or as 8-/16-/32-Gigabit Fibre Channel ports.
N9K-C93180YC-FX-241-RU 24 1/10/25-Gigabit Ethernet SFP28 front panel ports and 6 fixed 40/100-Gigabit Ethernet QSFP28 spine-facing ports. The SFP28 ports support 1-, 10-, and 25-Gigabit Ethernet connections and 8-, 16-, and 32-Gigabit Fibre Channel connections.
N9K-C93108TC-FX1-RU Top-of-Rack switch with 48 100M/1/10GBASE-T (copper) ports and 6 40-/100-Gigabit QSFP28 ports
N9K-C93108TC-FX-241-RU 24 1/10GBASE-T (copper) front panel ports and 6 40/100-Gigabit QSFP28 spine-facing ports.
N9K-C93108TC-FX3P1-RU fixed-port switch with 48 100M/1/2.5/5/10GBASE-T ports and 6 40-/100-Gigabit QSFP28 ports
N9K-C9348GC-FXPNexus 9300 with 48p 100M/1 G, 4p 10/25 G SFP+ and 2p 100 G QSFP
N9K-C92348GC-XThe Cisco Nexus 92348GC-X switch (N9K-C92348GC-X) is a 1RU switch that supports 696 Gbps of bandwidth and over 250 mpps. The 1GBASE-T downlink ports on the 92348GC-X can be configured to work as 100-Mbps, 1-Gbps ports. The 4 ports of SFP28 can be configured as 1/10/25-Gbps and the 2 ports of QSFP28 can be configured as 40- and 100-Gbps ports. The Cisco Nexus 92348GC-X is ideal for big data customers that require a Gigabit Ethernet ToR switch with local switching.
N9K-C93180YC-EX1-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP28 fiber ports and 6 40-/100-Gigabit QSFP28 ports
N9K-C93180YC-EX-241-RU 24 1/10/25-Gigabit front panel ports and 6-port 40/100 Gigabit QSFP28 spine-facing ports
Table 12. Cisco Nexus 9200 and 9300 Fans and Fan Trays
Product IDDescriptionQuantityCisco Nexus Switches
NXA-FAN-160CFM-PEFan module with port-side exhaust airflow (blue coloring)39364C [1]
93360YC-FX2
NXA-FAN-160CFM-PIFan module with port-side intake airflow (burgundy coloring)39364C [1]
93360YC-FX2
NXA-FAN-160CFM2-PEFan module with port-side exhaust airflow (blue coloring)49364C-GX
NXA-FAN-160CFM2-PIFan module with port-side intake airflow (burgundy coloring)49364C-GX
NXA-FAN-30CFM-BFan module with port-side intake airflow (burgundy coloring)393108TC-EX
93108TC-FX [1]
93180YC-EX
93180YC-FX [1]
9348GC-FXP [1]
NXA-FAN-30CFM-FFan module with port-side exhaust airflow (blue coloring)393108TC-EX
93108TC-FX [1]
93180YC-EX
93180YC-FX [1]
NXA-FAN-35CFM-PEFan module with port-side exhaust airflow (blue coloring)49348GC-FXP
92300YC [1]
9332C [1]
93180YC-FX3S [2]
93180YC-FX3
93108TC-FX3P
NXA-FAN-35CFM-PIFan module with port-side intake airflow (burgundy coloring)49336C-FX2-E
9316D-GX
93600CD-GX
92300YC [1]
9332C [1]
93180YC-FX3S [2]
93180YC-FX3
NXA-FAN-65CFM-PEFan module with port-side exhaust airflow (blue coloring)693108TC-FX3P
9316D-GX
93600CD-GX
9336C-FX2-E
NXA-FAN-65CFM-PIFan module with port-side exhaust airflow (blue coloring)69336C-FX2-E
NXA-FAN-65CFM-PEFan module with port-side exhaust airflow (blue coloring)393240YC-FX2 [1]
9336C-FX2 [1]
NXA-FAN-65CFM-PIFan module with port-side exhaust airflow (burgundy coloring)393240YC-FX2
9336C-FX2 [1]
Table 13. Cisco Nexus 9200 and 9300 Power Supplies
Product IDDescriptionQuantityCisco Nexus Switches
NXA-PAC-500W-PE500-W AC power supply with port-side exhaust airflow (blue coloring)293108TC-EX
93180YC-EX
93180YC-FX
NXA-PAC-500W-PI500-W AC power supply with port-side intake airflow (burgundy coloring)293108TC-EX
93180YC-EX
93180YC-FX
NXA-PAC-650W-PE650-W power supply with port-side exhaust (blue coloring)292300YC
93180YC-FX3S
93108TC-EX
93180YC-EX
93180YC-FX3
NXA-PAC-650W-PI650-W power supply with port-side intake (burgundy coloring)292300YC
93180YC-FX3S
93108TC-EX
93180YC-EX
93180YC-FX3
NXA-PAC-750W-PE750-W AC power supply with port-side exhaust airflow (blue coloring) 129336C-FX2
9336C-FX2-E
9332C
93240YC-FX2
NXA-PAC-750W-PI750-W AC power supply with port-side intake airflow (burgundy coloring) 129336C-FX2
9336C-FX2-E
9332C
93240YC-FX2
NXA-PAC-1100W-PE21100-W AC power supply with port-side exhaust airflow (blue coloring)293240YC-FX2
9332C
9316D-GX
9336C-FX2
9336C-FX2-E
93600CD-GX
NXA-PAC-1100W-PI21100-W AC power supply with port-side intake airflow (burgundy coloring)293240YC-FX2
9332C
9316D-GX
NXA-PAC-1100W-PICisco Nexus 9000 PoE 1100W AC PS, port-side intake293108TC-FX3P
NXA-PAC-1100W-PECisco Nexus 9000 PoE 1100W AC PS, port-side exhaust293108TC-FX3P
NXA-PAC-1900W-PICisco Nexus 9000 PoE 1900W AC PS, port-side intake293108TC-FX3P
NXA-PAC-1200W-PE1200-W AC power supply with port-side exhaust airflow (blue coloring)293360YC-FX2
9364C
NXA-PAC-1200W-PI1200-W AC power supply with port-side intake airflow (burgundy coloring)293360YC-FX2
9364C
N9K-PUV-1200W1200-W Universal AC/DC power supply with bidirectional airflow (white coloring)292300YC
93108TC-EX
93108TC-FX
93360YC-FX2
93180YC-FX3S
93180YC-EX
93180YC-FX
9364C
NXA-PDC-930W-PE930-W DC power supply with port-side exhaust airflow (blue coloring)293108TC-EX
93180YC-EX
93360YC-FX2
93180YC-FX3S
93180YC-FX
9364C
NXA-PDC-930W-PI930-W DC power supply with port-side intake airflow (burgundy coloring)293108TC-EX
93180YC-EX
93360YC-FX2
93180YC-FX3S
93180YC-FX
9364C
NXA-PDC-1100W-PE1100-W DC power supply with port-side exhaust airflow (blue coloring)293240YC-FX2
93600CD-GX
9316D-GX
9332C
9336C-FX2
9336C-FX2-E
NXA-PDC-1100W-PI1100-W DC power supply with port-side intake airflow (burgundy coloring)293240YC-FX2
93600CD-GX
9316D-GX
9332C
9336C-FX2
9336C-FX2-E
UCSC-PSU-930WDC930-W DC power supply with port-side intake (green coloring)293108TC-EX
93180YC-EX
UCS-PSU-6332-DC930-W DC power supply with port-side exhaust (gray coloring)293108TC-EX
93180YC-EX
Table 14. Cisco Nexus 9500 Cloud Scale Line Cards
Product IDN9K-C9504FM-GN9K-C9508FM-GN9K-C9504-FM-EN9K-C9508-FM-EN9K-C9508-FM-E2N9K-C9516-FM-E2
N9K-X9716D-GX44NoNoNoNo
N9K-X9736C-FX555555
N9K-X97160YC-EX444444
N9K-X9788TC-FX444444
N9K-X9732C-EX444444
N9K-X9736C-EX444444
Table 15. Cisco Nexus 9500 R-Series Line Cards
Product IDN9K-C9504-FM-RN9K-C9508-FM-R
N9K-X9636C-RX66
N9K-X9636Q-R44
N9K-X9636C-R5 (n+1 redundancy)5 (n+1 redundancy)
N9K-X96136YC-R66
Table 16. Cisco Nexus 9500 R2-Series Line Cards
Product IDN9K-C9508-FM-R2
N9K-X9624D-R26

Optics

To determine which transceivers and cables are supported by a switch, see the Transceiver Module (TMG) Compatibility Matrix. To see the transceiver specifications and installation information, see the Install and Upgrade Guides.

Cisco Nexus Dashboard Insights

Cisco NX-OS Release 10.2(1)F supports the Nexus Dashboard Insights on Cisco Nexus 9200, 9300-EX, and 9300-FX platform switches and 9500 platform switches with -EX/FX line cards. For more information, see the Cisco Nexus Insights documentation.

Upgrade and Downgrade

To perform a software upgrade or downgrade, follow the instructions in the Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 10.2(x). For information about an In Service Software Upgrade (ISSU), see the Cisco NX-OS ISSU Support Matrix.

Related Content

This document describes and provides links to the user documentation available for Cisco Nexus 9000. To find a document online, use one of the links in this section.

DocumentDescription
Cisco Nexus 9000 Series SwitchesCisco Nexus 9000 Series documentation
Cisco NX-OS Software Strategy and Lifecycle GuideCisco NX-OS Software Release and Image-naming Convention
Cisco Nexus 9000 and 3000 Series NX-OS Switch License NavigatorCisco Nexus 9000 and 3000 Series NX-OS Switch License Navigator
Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade Guide, Release 10.2(x)Cisco Nexus 9000 Series Software Upgrade and Downgrade Guide
Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 10.2(1)Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes
Cisco Nexus NX-API ReferenceCisco Nexus 3000 and 9000 Series NX-API REST SDK User Guide and API Reference
ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.htmlCisco NX-OS Supported MIBs
Cisco Nexus 9000 Series Switch FEX Support MatrixSupported FEX modules
Cisco NX-OS Licensing Guide and Cisco Nexus Smart Licensing Using Policy User GuideLicensing Information

When you downgrade from Cisco NX-OS Release 10.2(1) to an earlier release, the features that use the ACI+NX-OS Essentials, Advantage, and add-on licenses or the Hardware Streaming Telemetry license continue to work in honor mode in the downgraded version. In addition, the output of the show license usage command continues to include entries for these unsupported licenses.
For more information, see the Cisco NX-OS Licensing Guide.

Documentation Feedback

To provide technical feedback on this document, or to report an error or omission, please send your comments to nexus9k-docfeedback@cisco.com. We appreciate your feedback.

Legal Information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

©2021-2023 Cisco Systems, Inc. All rights reserved.


File Info : application/pdf, 35 Pages, 972.22KB

PDF preview unavailable. Download the PDF instead.

cisco-nexus-9000-nxos-release-notes-1021

References

Microsoft Word 2010 䵩捲潳潦璮⁗潲搠㈰㄰㬠浯摩晩敤⁵獩湧⁩呥硴′⸱⸷⁢礠ㅔ㍘

Related Documents

Preview Cisco Nexus 9000 ACI-Mode Switches Release Notes, Release 15.1(1)
This document provides release notes for the Cisco Nexus 9000 ACI-Mode Switches, covering features, issues, and limitations for Release 15.1(1). It details supported hardware, new hardware features, changes in behavior, open and resolved issues, and compatibility information.
Preview Cisco Nexus 9332C Switch Overview and Hardware Features
This document provides an overview of the Cisco Nexus 9332C switch, detailing its hardware features, port configurations, fan modules, and power supply options. It includes information on airflow management and compatibility.
Preview Cisco Nexus 9336C-FX2 Switch Overview and Hardware Features
An overview of the Cisco Nexus 9336C-FX2 switch, a 1-RU fixed-port switch for data center deployments, detailing its ports, fan modules, power supplies, and hardware features.
Preview Cisco Nexus 9000 Series NX-OS Release Notes 10.3(8)M
Release notes for Cisco NX-OS version 10.3(8)M, detailing supported hardware, new features, resolved issues, and compatibility information for Cisco Nexus 9000 series switches.
Preview Cisco Nexus 9000 Series NX-OS Release Notes, Release 10.4(2)F
This document provides details on new features, issues, and exceptions for Cisco NX-OS Release 10.4(2)F software used with Cisco Nexus 9000 Series switches. It covers hardware compatibility, new and enhanced software features, and resolved and open issues.
Preview Configuring MACsec on Cisco NX-OS Devices
This document provides a comprehensive guide on configuring MACsec (Media Access Control Security) on Cisco NX-OS devices, covering essential aspects from basic setup to advanced configurations and troubleshooting.
Preview Cisco Nexus 9504 スイッチ (NX-OS モード) ハードウェア設置ガイド
Cisco Nexus 9504 スイッチ (NX-OS モード) のハードウェア設置ガイド。設置場所の準備、環境要件、モジュール交換、電源、冷却、LEDインジケータなどの詳細情報を提供します。
Preview Cisco ACI Fabric Endpoint Learning: A Comprehensive Guide
Explore the intricacies of Cisco ACI fabric endpoint learning, covering behavior, deployment, and optimization options for efficient network management and traffic flow.