Upload
others
View
306
Download
1
Embed Size (px)
Citation preview
Cisco Systems, Inc. www.cisco.com
1
Cisco Nexus 9000 Series NX-OS Release
Notes, Release 9.3(2) This document describes the features, caveats, and limitations of Cisco NX-OS Release 9.3(2) software for use on Cisco
Nexus 9000 Series switches.
Use this document with documents listed in Related Documentation.
Table 1 shows the online change history of this document.
Table 1 Online History Change
Date Description
March 4, 2020 Updated the Introduction section.
January 26, 2020 Added CSCvc95008 to Known Behaviors.
November 15, 2019 Updated Limitations section for breakout issue.
November 6, 2019 Created the release notes for Release 9.3(2).
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Introduction
2
Contents
Introduction ............................................................................................................................................................ 3
Licensing Information .............................................................................................................................................. 3
System Requirements ............................................................................................................................................. 3
New and Changed Information .............................................................................................................................. 14
Cisco Network Insights for Data Center ................................................................................................................. 16
Caveats ................................................................................................................................................................. 16
Open Caveats—Cisco NX-OS Release 9.3(2) ........................................................................................................... 21
Known Behaviors—Cisco NX-OS Release 9.3(2) ..................................................................................................... 21
Upgrade Instructions ............................................................................................................................................. 23
Downgrade Instructions ........................................................................................................................................ 37
Software Maintenance Upgrades .......................................................................................................................... 37
Limitations ............................................................................................................................................................ 38
Unsupported Features ........................................................................................................................................... 39
Related Documentation ........................................................................................................................................ 42
Obtaining Documentation and Submitting a Service Request ................................................................................ 42
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Introduction
3
Introduction
Cisco NX-OS software is a data center-class operating system designed for performance, resiliency, scalability,
manageability, and programmability at its foundation. The Cisco NX-OS software provides a robust and comprehensive
feature set that meets the requirements of virtualization and automation in mission-critical data center environments. The
modular design of the Cisco NX-OS operating system makes zero-impact operations a reality and enables exceptional
operational flexibility.
Cisco Nexus 9000 Series switches and the Cisco Nexus 3000 Series switches, use same NX-OS binary image also
3400-S, 3500, and 3600 platform switches. Cisco NX-OS Release 9.2(1) was the first release that adopted unified
version numbering. With unified version numbering, the platform designator is obsolete.
Moving forward for the previously identified platforms, we will be adopting the simplified 3-letter versioning scheme. For
example, a release with X.Y(Z) would mean:
X Unified release major
Y Major / Minor release
Z Maintenance release (MR)
Where the Z = 1 is always the first FCS release of a Major/Minor release.
An example of a previous release number is: 7.0(3)I7(4). In this format, is the platform designator.
Note: In order to accommodate upgrade compatibility from an older software version that is expecting a platform
designator, when the install all command is entered or the show install all impact command is entered, the version
string appears as 9.3(2)I9(1). Th can be safely ignored. It will later appear as 9.3(2).
Note: The Cisco Nexus 34180YC and 3464C platform switches are not supported in Cisco NX-OS Release 9.3(2).
Licensing Information
When you downgrade from Cisco NX-OS Release 9.3(2) to an earlier release, the features that use the ACI+NX-OS
Essentials, Advantage, and add-on licenses or the Hardware Streaming Telemetry license continue to work in honor
mode in the downgraded version. In addition, the output of the show license usage command continues to include
entries for these unsupported licenses.
For more information, see the Cisco NX-OS Licensing Guide.
System Requirements
This section includes the following sections:
■ Supported Device Hardware
■ Supported Optics
■ Supported FEX Modules
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
4
Supported Device Hardware
The following tables list the Cisco Nexus 9000 Series hardware that Cisco NX-OS Release 9.3(2) supports. For additional
information about the supported hardware, see the Hardware Installation Guide for your Cisco Nexus 9000 Series device.
Table 2 Cisco Nexus 9500 Switches .................................................................................................................... 4 Table 3 Cisco Nexus 9500 Cloud Scale Line Cards ............................................................................................. 4 Table 4 Cisco Nexus 9500 R-Series Line Cards .................................................................................................. 5 Table 5 Cisco Nexus 9500 Classic Line Cards ..................................................................................................... 5 Table 6 Cisco Nexus 9500 Cloud Scale Fabric Modules ...................................................................................... 6 Table 7 Cisco Nexus 9500 R-Series Fabric Modules ........................................................................................... 6 Table 8 Cisco Nexus 9500 Fabric Modules .......................................................................................................... 6 Table 9 Cisco Nexus 9500 Fabric Module Blanks with Power Connector ............................................................. 6 Table 10 Cisco Nexus 9500 Supervisor Modules ................................................................................................. 7 Table 11 Cisco Nexus 9500 System Controller .................................................................................................... 7 Table 12 Cisco Nexus 9500 Fans and Fan Trays .................................................................................................. 7 Table 13 Cisco Nexus 9500 Power Supplies........................................................................................................ 7 Table 14 Cisco Nexus 9200 and 9300 Fans and Fan Trays .................................................................................. 7 Table 15 Cisco Nexus 9200 and 9300 Power Supplies ........................................................................................ 9 Table 16 Cisco Nexus 9200 and 9300 Switches ................................................................................................ 11 Table 17 Cisco Nexus 9000 Series Uplink Modules ........................................................................................... 13
Table 2 Cisco Nexus 9500 Switches
Product ID Description
N9K-C9504 7.1-RU modular switch with slots for up to 4 line cards in addition to two supervisors, 2 system
controllers, 3 to 6 fabric modules, 3 fan trays, and up to 4 power supplies.
N9K-C9508 13-RU modular switch with slots for up to 8 line cards in addition to two supervisors, 2 system
controllers, 3 to 6 fabric modules, 3 fan trays, and up to 8 power supplies.
N9K-C9516 21-RU modular switch with slots for up to 16 line cards in addition to two supervisors, 2 system
controllers, 3 to 6 fabric modules, 3 fan trays, and up to 10 power supplies.
Table 3 Cisco Nexus 9500 Cloud Scale Line Cards
Product ID Description Maximum Quantity
Cisco
Nexus
9504
Cisco
Nexus
9508
Cisco
Nexus
9516
N9K-X9736C-FX Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line
card
4 8 16
N9K-X9732C-FX Cisco Nexus 9500 32-port 40/100 Gigabit Ethernet QSFP28 line
card
4 8 16
N9K-X9732C-EX Cisco Nexus 9500 32-port 40/100 Gigabit Ethernet QSFP28 line
card
4 8 16
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
5
N9K-X9736C-EX Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet QSFP28 line
card
4 8 16
N9K-X9788TC-FX Cisco Nexus 9500 48-port 1/10-G BASE-T Ethernet and 4-port
40/100 Gigabit Ethernet QSFP28 line card
4 8 16
N9K-X97160YC-
EX
Cisco Nexus 9500 48-port 10/25-Gigabit Ethernet SFP28 and 4-
port 40/100 Gigabit Ethernet QSFP28 line card
4 8 16
Table 4 Cisco Nexus 9500 R-Series Line Cards
Product ID Description Maximum Quantity
Cisco Nexus
9504
Cisco Nexus
9508
N9K-X9636C-R Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet
QSFP28 line card
4 8
N9K-X9636C-RX Cisco Nexus 9500 36-port 40/100 Gigabit Ethernet
QSFP28 line card
4 8
N9K-X9636Q-R Cisco Nexus 9500 36-port 40 Gigabit Ethernet QSFP
line card
4 8
N9K-X96136YC-R Cisco Nexus 9500 16-port 1/10 Gigabit, 32-port 10/25
Gigabit, and 4-port 40/100 Gigabit Ethernet line card
4 8
Table 5 Cisco Nexus 9500 Classic Line Cards
Product ID Description Maximum Quantity
Cisco
Nexus
9504
Cisco
Nexus
9508
Cisco
Nexus
9516
N9K-X9408C-
CFP2
Line card with 8 100 Gigabit CFP2 ports 4 8 16
N9K-X9432C-S Cisco Nexus 9500 32-port 40/100 Gigabit Ethernet QSFP28 line
card
4 8 N/A
N9K-X9432PQ Cisco Nexus 9500 32-port 40 Gigabit Ethernet QSFP+ line card 4 8 16
N9K-X9636PQ Cisco Nexus 9500 36-port 40 Gigabit Ethernet QSFP+ line card 4 8 N/A
N9K-X9464PX Cisco Nexus 9500 48 1/10-Gigabit SFP+ and 4-port 40-Gigabit
Ethernet QSFP+ line card
4 8 16
N9K-X9464TX Cisco Nexus 9500 48 port 1/10-Gigabit BASE-T Ethernet and 4-
port 40-Gigabit Ethernet QSFP+ line card
4 8 16
N9K-X9464TX2 Cisco Nexus 9500 48 port 1/10-Gigabit BASE-T Ethernet and 4-
port 40-Gigabit Ethernet QSFP+ line card
4 8 16
N9K-X9536PQ Cisco Nexus 9500 36-port 40 Gigabit Ethernet QSFP+ line card 4 8 16
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
6
N9K-X9564PX Cisco Nexus 9500 48 1/10-Gigabit SFP+ and 4 port 40-Gigabit
Ethernet QSFP+ line card
4 8 16
N9K-X9564TX Cisco Nexus 9500 48 port 1/10-Gigabit BASE-T Ethernet and 4
port 40-Gigabit Ethernet QSFP+ line card
4 8 16
Table 6 Cisco Nexus 9500 Cloud Scale Fabric Modules
Product ID Description Minimum Maximum
N9K-C9504-FM-E Cisco Nexus 9504 100-Gigabit cloud scale
fabric module
4 5
N9K-C9508-FM-E Cisco Nexus 9508 100-Gigabit cloud scale
fabric module
4 5
N9K-C9508-FM-E2 Cisco Nexus 9508 100-Gigabit cloud scale
fabric module
4 5
N9K-C9516-FM-E Cisco Nexus 9516 50-Gigabit cloud scale
fabric module
4 5
N9K-C9516-FM-E2
Cisco Nexus 9516 100-Gigabit cloud scale
fabric module
4 5
Table 7 Cisco Nexus 9500 R-Series Fabric Modules
Product ID Description Minimum Maximum
N9K-C9504-FM-R Cisco Nexus 9504 100-Gigabit R-Series
fabric module
4 6
N9K-C9508-FM-R Cisco Nexus 9508 100-Gigabit R-Series
fabric module
4 6
Table 8 Cisco Nexus 9500 Fabric Modules
Product ID Description Minimum Maximum
N9K-C9504-FM Cisco Nexus 9504 40-Gigabit fabric module 3 6
N9K-C9508-FM Cisco Nexus 9508 40-Gigabit fabric module 3 6
N9K-C9516-FM Cisco Nexus 9516 40-Gigabit fabric module 3 6
N9K-C9504-FM-S Cisco Nexus 9504 100-Gigabit fabric module 4 4
N9K-C9508-FM-S Cisco Nexus 9508 100-Gigabit fabric module 4 4
Table 9 Cisco Nexus 9500 Fabric Module Blanks with Power Connector
Product ID Description Minimum Maximum
N9K-C9508-FM-Z Cisco Nexus 9508 Fabric blank with Fan Tray
Power Connector module
N/A 2
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
7
N9K-C9516-FM-Z Cisco Nexus 9516 Fabric blank with Fan Tray
Power Connector module
N/A 2
Table 10 Cisco Nexus 9500 Supervisor Modules
Supervisor Description Quantity
N9K-SUP-A 1.8-GHz supervisor module with 4 cores, 4 threads, and 16 GB of memory 2
N9K-SUP-A+ 1.8-GHz supervisor module with 4 cores, 8 threads, and 16 GB of memory 2
N9K-SUP-B 2.2-GHz supervisor module with 6 cores, 12 threads, and 24 GB of memory 2
N9K-SUP-B+ 1.9-GHz supervisor module with 6 cores, 12 threads, and 32 GB of memory 2
NOTE: N9K-SUP-A and N9K-SUP-A+ are not supported on Cisco Nexus 9504 and 9508 switches with -R line cards.
Table 11 Cisco Nexus 9500 System Controller
Product ID Description Quantity
N9K-SC-A Cisco Nexus 9500 Platform System Controller Module 2
Table 12 Cisco Nexus 9500 Fans and Fan Trays
Product ID Description Quantity
N9K-C9504-FAN Fan tray for 4-slot modular chassis 3
N9K-C9508-FAN Fan tray for 8-slot modular chassis 3
N9K-C9516-FAN Fan tray for 16-slot modular chassis 3
Table 13 Cisco Nexus 9500 Power Supplies
Product ID Description Quantity Cisco Nexus Switches
N9K-PAC-3000W-B 3 KW AC power supply Up to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PDC-3000W-B 3 KW DC power supply Up to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PUV-3000W-B 3 KW Universal AC/DC power supply Up to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
N9K-PUV2-3000W-B 3.15-KW Dual Input Universal AC/DC Power
Supply
Up to 4
Up to 8
Up to 10
Cisco Nexus 9504
Cisco Nexus 9508
Cisco Nexus 9516
Table 14 Cisco Nexus 9200 and 9300 Fans and Fan Trays
Product ID Description Quantity Cisco Nexus Switches
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
8
Product ID Description Quantity Cisco Nexus Switches
N9K-C9300-FAN1 Fan 1 module with port-side intake airflow
(burgundy coloring)
3 9396PX (early versions)
N9K-C9300-FAN1-B Fan 1 module with port-side exhaust airflow
(blue coloring)
3 9396PX (early versions)
N9K-C9300-FAN2 Fan 2 module with port-side intake airflow
(burgundy coloring)
3 93128TX
9396PX
9396TX
N9K-C9300-FAN2-B Fan 2 module with port-side exhaust airflow
(blue coloring)
3 93128TX
9396PX
9396TX
N9K-C9300-FAN3 Fan 3 module with port-side intake airflow
(burgundy coloring)
3 92304QC
9272Q1
93120TX
N9K-C9300-FAN3-B Fan 3 module with port-side exhaust airflow
(blue coloring)
3 92304QC
9272Q1
93120TX
NXA-FAN-160CFM-PE Fan module with port-side exhaust airflow
(blue coloring)
3 9364C1 93360YC-
FX2
NXA-FAN-160CFM-PI Fan module with port-side intake airflow
(burgundy coloring)
3 9364C1 93360YC-
FX2
NXA-FAN-30CFM-B Fan module with port-side intake airflow
(burgundy coloring)
3 92160YC-X
9236C1
93108TC-
EX
93108TC-
FX1
93180LC-
EX1
93180YC-
EX
93180YC-
FX1
9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9348GC-
FXP1
NXA-FAN-30CFM-F Fan module with port-side exhaust airflow
(blue coloring)
3 92160YC-X
9236C1
93108TC-
EX
93108TC-
FX1
93180LC-
EX1
93180YC-
EX
93180YC-
FX1
9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9348GC-
FXP
NXA-FAN-35CFM-PE Fan module with port-side exhaust airflow
(blue coloring)
4 92300YC1 9332C1
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
9
Product ID Description Quantity Cisco Nexus Switches
9232C1
NXA-FAN-35CFM-PI Fan module with port-side intake airflow
(burgundy coloring)
4 92300YC1
9232C1
9332C1
NXA-FAN-65CFM-PE Fan module with port-side exhaust airflow
(blue coloring)
3 93240YC-
FX21
9336C-FX21
NXA-FAN-65CFM-PI Fan module with port-side exhaust airflow
(burgundy coloring)
3 93240YC-
FX21
9336C-FX21
1For specific fan speeds see the Overview section of the Hardware Installation Guide.
Table 15 Cisco Nexus 9200 and 9300 Power Supplies
Product ID Description Quantity Cisco Nexus Switches
NXA-PAC-500W-PE 500-W AC power supply with port-side
exhaust airflow (blue coloring)
2 93108TC-EX
93180LC-EX
93180YC-
EX
93180YC-
FX
NXA-PAC-500W-PI 500-W AC power supply with port-side
intake airflow (burgundy coloring)
2 93108TC-EX
93180LC-EX
93180YC-
EX
93180YC-
FX
N9K-PAC-650W 650-W AC power supply with port-side
intake (burgundy coloring)
2 9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9396PX
9396TX
N9K-PAC-650W-B 650-W AC power supply with port-side
exhaust (blue coloring)
2 9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9396PX
9396TX
NXA-PAC-650W-PE 650-W power supply with port-side exhaust
(blue coloring)
2 92160YC-X
9236C
92300YC
92304QC
93108TC-
EX
93180YC-
EX
NXA-PAC-650W-PI 650-W power supply with port-side intake
(burgundy coloring)
2 92160YC-X
9236C
92300YC
92304QC
93108TC-
EX
93180YC-
EX
NXA-PAC-750W-PE 750-W DC power supply with port-side 2 9336C-FX2
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
10
Product ID Description Quantity Cisco Nexus Switches
exhaust airflow (blue coloring)
NXA-PAC-750W-PI 750-W DC power supply with port-side
exhaust airflow (burgundy coloring)
2 9336C-FX2
NXA-PAC-1100W-PE2 1100-W AC power supply with port-side
exhaust airflow (blue coloring)
2 93240YC-
FX2
9332C
9336C-FX2
NXA-PAC-1100W-PI2 1100-W AC power supply with port-side
intake airflow (burgundy coloring)
2 93240YC-
FX2
9332C
9336C-FX2
N9K-PAC-1200W 1200-W AC power supply with port-side
intake airflow (burgundy coloring)
2 93120TX
N9K-PAC-1200W-B 1200-W AC power supply with port-side
exhaust airflow (blue coloring)
2 93120TX
NXA-PAC-1200W-PE 1200-W AC power supply with port-side
exhaust airflow (blue coloring)
2 9272Q
93360YC-
FX2
9364C
NXA-PAC-1200W-PI 1200-W AC power supply with port-side
intake airflow (burgundy coloring)
2 9272Q
93360YC-
FX2
9364C
N9K-PUV-1200W 3000-W Universal AC/DC power supply with
bidirectional airflow (white coloring)
2 92160YC-X
9236C
92300YC
92304QC
9272Q1
93108TC-EX
93108TC-FX
93360YC-
FX2
93120TX
93128TX
93180LC-
EX
93180YC-
EX
93180YC-
FX
9364C
NXA-PDC-930W-PE 930-W DC power supply with port-side
exhaust airflow (blue coloring)
2 9272Q
93108TC-FX
93180LC-EX
93360YC-
FX2
93120TX
93180YC-
FX
9364C
92160YC-X
NXA-PDC-930W-PI 930-W DC power supply with port-side
intake airflow (burgundy coloring)
2 9272Q
93108TC-FX
93180LC-EX
93360YC-
FX2
93120TX
93180YC-
FX
9364C
92160YC-X
NXA-PDC-1100W-PE 1100-W DC power supply with port-side 2 93240YC- 9332C
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
11
Product ID Description Quantity Cisco Nexus Switches
exhaust airflow (blue coloring) FX2 9336C-FX2
NXA-PDC-1100W-PI 1100-W DC power supply with port-side
intake airflow (burgundy coloring)
2 93240YC-
FX2
9332C
9336C-FX2
UCSC-PSU-930WDC 930-W DC power supply with port-side
intake (green coloring)
2 92160YC-X
9236C
92304QC
9272Q
93108TC-EX
93120TX
93128TX
93180YC-EX
9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9396PX
9396TX
UCS-PSU-6332-DC 930-W DC power supply with port-side
exhaust (gray coloring)
2 92160YC-X
9236C
92304QC
9272Q
93108TC-EX
93120TX
93128TX
93180YC-EX
9332PQ
9372PX
9372PX-E
9372TX
9372TX-E
9396PX
9396TX
NXA-PDC-1100W-PE 1100-W DC power supply with port-side
exhaust airflow (blue coloring)
2 93240YC-
FX
NXA-PHV-1100W-PE 1100-W AC power supply with port-side
exhaust airflow (blue coloring)
2 93240YC-
FX2
9336C-FX2
NXA-PHV-1100W-PI 1100-W AC power supply with port-side
intake airflow (burgundy coloring)
2 93240YC-
FX2
9336C-FX2
N2200-PAC-400W 400-W AC power supply with port-side
exhaust airflow (blue coloring)
2 92348GC-X
N2200-PAC-400W-B 400-W AC power supply with port-side
intake airflow (burgundy coloring)
2 92348GC-X
Table 16 Cisco Nexus 9200 and 9300 Switches
Cisco Nexus Switch Description
N9K-C9336C-FX2 1-RU switch with 36 40-/100-Gb Ethernet QSFP28 ports.
N9K-C93216TC-FX2 2-RU switch with 96 100M/1G/10G RJ45 ports, 12 40/100-Gigabit QSFP28
ports, 2 management ports (one RJ-45 and one SFP port, 1 console, port,
and 1 USB port.
N9K-C93240YC-FX2 1.2-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP28 fiber ports and 12
40-/100-Gigabit Ethernet QSFP28 ports.
N9K-C93360YC-FX2 2-RU switch with 96 10-/25-Gigabit SFP28 ports and 12 40/100-Gigabit
QSFP28 ports
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
12
Cisco Nexus Switch Description
N9K-C93108TC-FX 1-RU Top-of-Rack switch with 48 100M/1/10GBASE-T (copper) ports and 6
40-/100-Gigabit QSFP28 ports
N9K-C93108TC-FX-24 1-RU 24 1/10GBASE-T (copper) front panel ports and 6 fixed 40/100-Gigabit
Ethernet QSFP28 spine-facing ports.
N9K-C93180YC-FX 1-RU Top-of-Rack switch with 10-/25-/32-Gigabit Ethernet/FC ports and 6
40-/100-Gigabit QSFP28 ports. You can configure the 48 ports as 1/10/25-
Gigabit Ethernet ports or as FCoE ports or as 8-/16-/32-Gigabit Fibre
Channel ports.
N9K-C93180YC-FX-24 1-RU 24 1/10/25-Gigabit Ethernet SFP28 front panel ports and 6 fixed
40/100-Gigabit Ethernet QSFP28 spine-facing ports. The SFP28 ports sup-
port 1-, 10-, and 25-Gigabit Ethernet connections and 8-, 16-, and 32-
Gigabit Fibre Channel connections.
N9K-C93108TC-EX 1-RU Top-of-Rack switch with 48 10GBASE-T (copper) ports and 6 40-
/100-Gigabit QSFP28 ports
N9K-C93108TC-EX-24 1-RU 24 1/10GBASE-T (copper) front panel ports and 6 40/100-Gigabit
QSFP28 spine facing ports.
N9K-C93180LC-EX 1-RU Top-of-Rack switch with 24 40-/50-Gigabit QSFP+ downlink ports and
6 40/100-Gigabit uplink ports. You can configure 18 downlink ports as 100-
Gigabit QSFP28 ports or as 10-Gigabit SFP+ ports (using breakout cables)
N9K-C93180YC-EX 1-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP28 fiber ports and 6
40-/100-Gigabit QSFP28 ports
N9K-C93180YC-EX-24 1-RU 24 1/10/25-Gigabit front panel ports and 6-port 40/100 Gigabit
QSFP28 spine-facing ports
N9K-C92160YC-X 1-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP+ ports and 6 40-
Gigabit QSFP+ ports (4 of these ports support 100-Gigabit QSFP28 optics).
N9K-C92300YC 1.5-RU Top-of-Rack switch with 48 10-/25-Gigabit SFP28 ports and 18
fixed 40-/100-Gigabit QSFP28 ports.
N9K-C92304QC 2-RU Top-of-Rack switch with 56 40-Gigabit Ethernet QSFP+ ports (16 of
these ports support 4x10 breakout cables) and 8 100-Gigabit QSFP28 ports.
N9K-C9236C 1-RU Top-of-Rack switch with 36 40-/100-Gigabit QSFP28 ports (144 10-
/25-Gigabit ports when using breakout cables)
N9K-C92348GC-X The Cisco Nexus 92348GC-X switch (N9K-C92348GC-X) is a
1RU switch that supports 696 Gbps of bandwidth and over 250 mpps. The
1GBASE-T downlink ports on the 92348GC-X can be configured to work as
100-Mbps, 1-Gbps ports. The 4 ports of SFP28 can be configured as
1/10/25-Gbps and the 2 ports of QSFP28 can be configured as 40- and 100-
Gbps ports. The Cisco Nexus 92348GC-X is ideal for big data customers that
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
System Requirements
13
Cisco Nexus Switch Description
require a Gigabit Ethernet ToR switch with local switching.
N9K-C9272Q 2-RU Top-of-Rack switch with 72 40-Gigabit Ethernet QSFP+ ports (35 of
these ports also support 4x10 breakout cables for 140 10-Gigabit ports)
N9K-C9332C 1-RU fixed switch with 32 40/100-Gigabit QSFP28 ports and 2 fixed 1/10-
Gigabit SFP+ ports.
N9K-C9364C 2-RU Top-of-Rack switch with 64 40-/100-Gigabit QSFP28 ports and 2 1-
/10-Gigabit SFP+ ports.
- Ports 1 to 64 support 40/100-Gigabit speeds.
- Ports 1 to 64 support 10 Gigabits (only with QSA)/40/100-Gigabit speeds
and are colored green to indicate hardware support for MACsec encryption.
Ports 65 and 66 support 1/10 Gb speeds.
N9K-C93120TX 2-RU Top-of-Rack switch with 96 1/10GBASE-T (copper) ports and 6 40-
Gigabit QSFP+ ports
N9K-C93128TX 3-RU Top-of-Rack switch with 96 1/10GBASE-T (copper) ports and an uplink
module up to 8 40-Gigabit QSFP+ ports
N9K-C9332PQ 1-RU switch with 32 40-Gigabit Ethernet QSFP+ ports (26 ports support 4x10
breakout cables and 6 ports support QSFP-to-SFP adapters)
N9K-C9348GC-FXP Nexus 9300 with 48p 100M/1 G, 4p 10/25 G SFP+ and 2p 100 G QSFP
N9K-C9372PX 1-RU Top-of-Rack switch with 48 1-/10-Gigabit SFP+ ports and 6 40-
Gigabit QSFP+ ports
N9K-C9372PX-E An enhanced version of the Cisco Nexus 9372PX-E switch.
N9K-C9372TX 1-RU Top-of-Rack switch with 48 1-/10GBASE-T (copper) ports and 6 40-
Gigabit QSFP+ ports
N9K-C9372TX-E An enhanced version of the Cisco Nexus 9372TX-E switch.
N9K-C9396PX 2-RU Top-of-Rack switch with 48 1-/10-Gigabit Ethernet SFP+ ports and an
uplink module with up to 12 40-Gigabit QSFP+ ports
N9K-C9396TX 2-RU Top-of-Rack switch with 48 1/10GBASE-T (copper) ports and an uplink
module with up to 12 40-Gigabit QSFP+ ports
Table 17 Cisco Nexus 9000 Series Uplink Modules
Product ID Description
N9K-M4PC-CFP2 Cisco Nexus 9300 uplink module with 4 100-Gigabit Ethernet CFP2 ports. For the Cisco
Nexus 93128TX switch, only two of the ports are active. For the Cisco Nexus 9396PX and
9396TX switches, all four ports are active.
N9K-M6PQ Cisco Nexus 9300 uplink module with 6 40-Gigabit Ethernet QSFP+ ports for the Cisco Nexus
9396PX, 9396TX, and 93128TX switches.
N9K-M6PQ-E An enhanced version of the Cisco Nexus N9K-M6PQ uplink module.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
New and Changed Information
14
Product ID Description
N9K-M12PQ Cisco Nexus 9300 uplink module with 12 40-Gigabit Ethernet QSPF+ ports.
Supported Optics
To determine which transceivers and cables are supported by this switch, see the Transceiver Module (TMG) Compati-
bility Matrix.
To see the transceiver specifications and installation information, see
https://www.cisco.com/c/en/us/support/interfaces-modules/transceiver-modules/products-installation-guides-
list.html.
Supported FEX Modules
Straight-through FEX module support has been added for the following switches:
■ N9K-C93360YC-FX2
For more information, see the Cisco Nexus 9000 Series Switch FEX Support page.
Note the following:
■ Beginning with Cisco NX-OS Release 9.2(1), dual-homed FEX support is added to Cisco Nexus 93180YC-FX,
and 93108TC-FX switches in addition to straight-through FEX support.
■ Beginning with Cisco NX-OS Release 9.2(1), straight-through FEX support is added to Cisco Nexus 93240YC-
FX2 and 9336C-FX2 switches.
■ Beginning with Cisco NX-OS Release 9.3(1), straight-through FEX support is added to Cisco Nexus 93360YC-
FX2.
■ Active-Active FEX and straight-through FEX are not supported on the Cisco Nexus 92348GC switch.
■ For FEX HIF port channels, enable the STP port type edge using the spanning tree port type edge [trunk]
command.
■ The Cisco Nexus 2248PQ, 2348TQ, 2348TQ-E, and 2348UPQ FEXs support connections to the Cisco Nexus
9300 or 9500 platform switches by using supported breakout cables to connect a QSFP+ uplink on the FEX and
an SFP+ link on the parent switch (4x10 G links).
Note: For Cisco Nexus 9500 platform switches, 4x10-Gb breakout for FEX connectivity is not supported.
New and Changed Information
This section lists the following topics:
■ New Hardware Features in Cisco NX-OS Release 9.3(2)
■ New Software Features in Cisco NX-OS Release 9.3(2)
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
New and Changed Information
15
New Hardware Features in Cisco NX-OS Release 9.3(2)
Cisco NX-OS Release 9.3(2) supports the following new hardware:
■ N9K-C93108TC-EX-24: Cisco Nexus 9300 platform switch with 24 1/10GBASE-T (copper) front panel ports
and 6 40/100-Gigabit QSFP28 spine facing ports.
■ N9K-C93108TC-FX-24: Cisco Nexus 9300 platform switch with 24 1/10GBASE-T (copper) front panel ports
and 6 fixed 40/100-Gigabit Ethernet QSFP28 spine-facing ports
■ N9K-C93180YC-EX-24: Cisco Nexus 9300 platform switch with 24 1/10/25-Gigabit front panel ports and 6-
port 40/100 Gigabit QSFP28 spine-facing ports
■ N9K-C93180YC-FX-24: Cisco Nexus 9300 platform switch with 24 1/10/25-Gigabit Ethernet SFP28 front panel
ports and 6 fixed 40/100-Gigabit Ethernet QSFP28 spine-facing ports. The SFP28 ports support 1-, 10-, and
25-Gigabit Ethernet connections and 8-, 16-, and 32-Gigabit Fibre Channel connections.
New Software Features in Cisco NX-OS Release 9.3(2)
Cisco NX-OS Release 9.3(2) supports the following new software features:
Fundamentals Features
■ Erase Configuration: Added support for the management IPv6 address and route to preserve after the write
erase operation in Cisco Nexus 9000 Series switches.
For more information, see the Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 9.3(x)
Licensing Features
■ Introduced the Following licenses for the Cisco Nexus 9300-XF and -GF platform switches:
o ACI-PREMIER-XF: LAN_ENTERPRISE_SERVICES_PKG, NETWORK_SERVICES_PKG, VPN_FABRIC, ACI-ES-
XF, NXOS_ESSENTIALS_XF/GF/M4/M8-16 and NXOS_ADVANTAGE_XF/GF/M4/M8-16
o ACI-PREMIER-GF: LAN_ENTERPRISE_SERVICES_PKG, NETWORK_SERVICES_PKG, VPN_FABRIC, ACI-ES-
GF, NXOS_ESSENTIALS_XF/GF/M4/M8-16 and NXOS_ADVANTAGE_XF/GF/M4/M8-16
For more information, see the Cisco NX-OS Licensing Guide.
Programmability Features
■ Native Data Source: Added support for the path mac-all command.
■ Telemetry Multi-Threading: Updated associated show command outputs.
For more information, see the Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 9.3(x). Security Features
■ User-Defined MAC address: Add the ability to enable configuring a user-defined MAC address limit between
the range of 16 to 256 for Cisco Nexus 3048, 3172PQ, 3172TQ, 3132Q-X, 3132Q-XL, 3172PQ-XL, 3172TQ-
XL, 31108PC-V, 31108TC-V, 3132Q-V, 3132C-Z, 3232C, 3264Q, 3264C-E, 36180YC-R, 3636C-R switches.
For more information, see the Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.3(x).
System Management Features
■ SNMP: Added support for new syslog trap message-generated.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Cisco Network Insights for Data Center
16
For more information, see the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release
9.3(x).
Cisco Network Insights for Data Center
■ Cisco NX-OS Release 9.3(2) supports the Cisco Network Insights Advisor (NIA) and Cisco Network Insights for
Resources (NIR) on Cisco Nexus 9500 platform switches with 9700-EX and 9700-FX line cards. Also, Cisco
Nexus 9200, 9300-EX and 9300-FX platform switches.
For more information, see the Cisco Network Insights documentation.
Caveats
Note: All caveats listed in this document are those that were reported against the Cisco Nexus 9000 Series switches.
Cisco Nexus 9000 Series, Cisco Nexus 9500-R/Cisco Nexus-3600-R Series, Cisco Nexus 3000 Series, and Cisco Nex-
us 3500 Series are platforms that run on the unified software and binary. Since some caveats listed against these plat-
forms could be applicable to the Cisco Nexus 3000 series platform too, we recommend that you review the list of cave-
ats in the Release Notes of the other platforms for this release, to see if those are applicable to your network configura-
tion.
This section includes the following topics:
■ Resolved Caveats Cisco NX-OS Release 9.3(2)
■ Open Caveats Cisco NX-OS Release 9.3(2)
■ Known Behaviors Cisco NX-OS Release 9.3(2)
Resolved Caveats Cisco NX-OS Release 9.3(2)
The following table lists the Resolved Caveats in Cisco NX-OS Release 9.3(2). Click the bug ID to access the Bug Search
tool and see additional information about the bug.
Table 22 Resolved Caveats in Cisco NX-OS Release 9.3(2)
Big ID Description
CSCuw99630 Cisco NX-OS Authenticated SNMP Denial of Service Vulnerability
CSCva76080 mmode crash when modifying maintenance profile
CSCva83141 "show system error-id list" error and vsh.bin crashed
CSCvb84849 Need support for DOM on FEX HIF ports
CSCvd17852 PIM BIDir DF election issue
CSCve04754
9200/9300/9700-EX: Need fix to avoid mcast flood on NDR & allow FEX to receive mcast traffic on NDR
CSCve24672 BGP routes not advertised to peer after shut/no shut of interface connected to peer
CSCve28831 Failure to configure 'rd auto' after deleting/re-configuring VRF
CSCve39999 BGP Traceback on shutdown of NVE interface with controller topology
CSCve71718 During switch bootup seeing MSDP-3-TSP_RWSEM_LOCK_FAIL: rwsem_lock_no_sig
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Caveats
17
Big ID Description
CSCve86603 n9k as-override no work after reload with maintenance mode
CSCve87784 Cisco NX-OS Border Gateway Protocol Denial of Service Vulnerability
CSCvf17888 BGP-3-SLAB_LIB_SLAB_ERR: Slab error [double free attempted] in RPM Prefix tree slab
CSCvf42015 "fragments" setting under ACL doesn't supress fragment ACE under PBR
CSCvf86455 BGP locally originated path becomes invalid
CSCvf94300 EVPN-SR: EVPN withdraw is sent first before LU withdraw with single BGP session for EVPN/LU
CSCvg26718 BGP routes imported into RIB more than maximum path set
CSCvg31276 TRM L3: After Local receiver goes away NGMVPN needs to withdraw local interest for remote S,G
CSCvg33640 BGP session should not establish when update source interface is down.
CSCvg77231 BGP stuck into Shut (NoMem) and neighbourship not formed
CSCvh12873 OIF is stuck in the mroute table after removing IGMP join-group
CSCvh14397 N9000 pim triggered register not enabled by default
CSCvh64876 "sh ip mroute summary" shows bogus values for pps and bit-rate
CSCvi04656 Standby Sup reload due to EOBC heartbeat failure (kfu_mts-app-137)
CSCvi07047 traffic duplication may be seen with ECMP to external source/RP
CSCvi07255 STP port type edge not working after upgrade to I7(x) in dual-homed FEX setup
CSCvi23870 N9000 does not set vlan routable flag when igmp snooping is enabled on vlan SVI
CSCvi44781 VRF is stuck in "Delete Holddown" state
CSCvi89557 9300-EX with AA FEX: few v3 mcast groups blackhole shut/no shut of MCT
CSCvj19118 default gw not installed in URIB after nh move
CSCvj33498 IGMP/PIM heartbeat cores on the secondary VPC peer
CSCvj43550 Dummy PIM neighbor 0.0.0.0 created after creating (S,G) entry when nbm is enabled
CSCvj61877 Reloading N9K EOR vpc peer caused packet loss from north to south
CSCvj63270 Cisco NX-OS Software Command Injection Vulnerability (CVE-2019-1791)
CSCvj77770 VxLAN Pseudo BGW Config for peer-type fabric-external Incorrectly Disables Split Horizon Check
CSCvj87950 9500: PIM register packet not send for 3 groups
CSCvj91750 N9508: reload the module after repeated 2B Parity Error in MMU table
CSCvj94409 When POAP is done, Maintenance mode profile config lost if switch reload
CSCvk08314 BGP traceback after changing VNID associated with vlan at the controller
CSCvk71597 N3164 Fastboot behavior with ALL IPv6 BGP neighbors down
CSCvm02926
Evaluation of n9k-standalone-sw for August CPU Side-Channel Information Disclosure Vulnerabili-ties
CSCvm24231 NX-OS : BGP : can not delete from urib ipv4 routes with ipv6 next-hop aka RFC5549
CSCvm47909 N9K-C93180LC-EX // LACP PDU timeout on bottom/even port if link goes down on top/odd port
CSCvm50912 Egress policy is getting pushed to other interfaces where it is not applied.
CSCvm52168 Ports may enter Internal-Fail errDisable when config/bringup and saving config
CSCvm57467 On changing the vlan -> vni mapping, vnis are in down state
CSCvm59219 BFD SHA1-auth interop CLI
CSCvm72233 Failaction least bucket/ node per assigned to a node which is down
CSCvm81238 Provide option to not run L3CC during transient conditions
CSCvm90522 N9000 prefers mBGP route over directly connected one causing mcast traffic black holing
CSCvm93838 Unable to delete remotely authenticated users when username contains period/dot "."
CSCvn00286 n9k switch-profile ACL support
CSCvn02785 ISIS does not advertise local or learned routes to neighbors after upgrade and coming out of mmode
CSCvn05890 UC_DF_CHECK_FAIILURE For Traffic on Infra Vlan on VPC Peer-link and advertise-pip
CSCvn05902 On 9200-EX, 9300-EX, 9700-EX, 9300-FX, 9300-FX2, ing-sup region should not be first region in
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Caveats
18
Big ID Description
TCAM
CSCvn10319 TRM:SG Mroute deleted on 1 BL leads to traffic duplication after Border Leaf Reload
CSCvn13270 Cisco FXOS and NX-OS Software Authenticated SNMP Denial of Service Vulnerability
CSCvn13645 can not change AD for ISIS ipv6 routes using distance command under ipv6 address family
CSCvn15038 vntag_mgr crash simultaneously
CSCvn16882 UnCorrectable Multibit ECC Errors in Tahoe Platforms
CSCvn18718 N9K-C9348GC-FXP:take about 4 sec to detect link down on rj45 port
CSCvn19051 System reset-reason on ascii reload shows---Module PowerCycled
CSCvn21120 "aaa bypass-user" option to bypass ACS authorization/accounting does not work
CSCvn21809 N3K: Nexus 31108PCV - tacacs-server key is not saved to config when using "< >" together
CSCvn22206 CVE-2018-17182: Use-after-free in vmacache_flush_all() kernel function vulnerability
CSCvn30363 COPP Crash after Modifying COPP when booted with POAP On N9000
CSCvn30699 Gold POST test failure alerts not reaching the remote syslog server.
CSCvn32653 N9K-C9516-FM-E: MAC is down but iETH link up
CSCvn33000 Regarding ISIS redistribute maximum-prefix less than static route number
CSCvn33365 IPV6 Route table not cleared when change ISIS IPV6 multi-topology to Single-topology
CSCvn35293 Stuck PO lock can inadvertently lock other PO while using copy+R+S and create system wide lock
CSCvn36239 URIB process crash due to VRF description character length
CSCvn36637 TACACS authentication with type 6 encryption fails after upgrade
CSCvn36645 Vlan not added to flood list, when new vlans are created in FL ingress-replication VXLAN
CSCvn36648 unable to use domain name as argument to ssh6 - ssh: Invalid Hostname
CSCvn36666 Vlan VNI in stale state if peer-vtep is used along with peer-ip in F&L ingress-replication VXLAN
CSCvn37301 With passive TWINAX cable N2K-C2348TQ-10G-E reports the Fan Failure
CSCvn41942 TAHUSD crash with repeated mac move
CSCvn42655 mac address out of sync between vpc peers after repeated mac move and stopping the mac move
CSCvn43362 N9k - During ISSU DME database Restore Failure
CSCvn47004 IPV4 adjacency down when change ISIS IPV6 MT to ST
CSCvn49397 Partial config sync after defaulting the interface in switch-profile// 9.2.2//N93180
CSCvn50769 N9k acl-mgr memory leak
CSCvn51737 N9k -EX all interface counters stop incrementing
CSCvn52620 PCM get locked permanently during FEX configs
CSCvn52938 N9K-PoAP: PoAP showing 0.0.0.0 as the DHCP server address.
CSCvn53007 IPv6 traffic with ip version 7 header is not dropped but forwarded on N9K
CSCvn56700 Nexus9000 Mcast pim spt-threshold infinity not honored when LHR transits from non-DR to DR
CSCvn57953 NVE failed to learn remote VTEP RMAC after ISSU aborted or canceled
CSCvn58564 N9K - Prevent "No lacp suspend-individual" From Being Configured on FEX Fabric Interfaces
CSCvn62162 no vn-segment failed to run
CSCvn63102 NVE failed to learn remote vtep RMAC after config change from DCNM/MW mode
CSCvn63483 Wrong Error message reported for ERSPAN destination on FEX HIF
CSCvn63957 Tunnel ECMP Index value triggers a crash
CSCvn67454 Spanning-tree BPDU Generated On Voice VLAN For MVAP Is Sent Untagged
CSCvn71860 Nginx crash while handling Bash request
CSCvn72749 N9300 may experience high correction after cable/transceiver is plugged in
CSCvn75003 Block stormcontrol-cli on N3K/N9K-R
CSCvn75206 N9K: 'power redundancy-mode insrc-redundant' missed after reload
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Caveats
19
Big ID Description
CSCvn80451 N9k stale S,G entry seen in VXLAN TRM environment
CSCvn81690 N9000 does send PTP mgmt packets out of the interface where it was received on
CSCvn82255 Packet drop if sfp of channel member port removed
CSCvn83200 Private-vlan host-associate command with range causes the process to hang
CSCvn89477 Frequent IGMP leave/join, leak in egress BW
CSCvn94487 N9300-EX/N9200 may experience permanent PTP high correction
CSCvn97606 AS-SET value showing 0 for aggregated routes in EVPN route.
CSCvo02656 Non-disruptive ISSU failing on N9k with "l3vm Startup failure" error
CSCvo02663 N9K not learning mac address
CSCvo02859
S Q-in-VNI L2 flood received on VPC peer-link not flooded when 'system dot1q tunnel transit' ena-bled
CSCvo04435 FEX port running FCoE goes into ErrDisabled(Pause Frame) without RX pause frames
CSCvo04778 MST reconfig will cause VLAN hardware programing to be missing on T2
CSCvo06469 Non encaped bridged traffic don't egress on peer-link when vPC leg down when any tunnel intf is up
CSCvo10679 VXLAN:NGMVPN service crashes due to could not allocate slab for fabric mroute
CSCvo10709 VXLAN: Seeing BGP-3-ASSERT error and traceback
CSCvo10976 N9K: Port link up suddenly w/ SFP-10G-SR-S but w/o connected cable
CSCvo11610 Fail to delete sub-if Port-Channel with certain BFD modes/flags enabled on parent interface
CSCvo15505 Egress packet loss from CPU when dest is recursive through EVPN
CSCvo17439 Cisco NX-OS Software SNMP Access Control List Configuration Name Bypass Vulnerability
CSCvo19594 Nexus 9000-FX QinQ VxLAN BGP EVPN. Multitag not functional after device is reloaded
CSCvo19627 copying SVI config from file to running-config does not set jumbo MTU in HW
CSCvo19805 Nexus 9k memory leak when SNMP walks OIDs (92160YC-X & N3048)
CSCvo21587 N9K-C93108TC-FX Shutting the link the peer port will be in up state
CSCvo36285
N9K BGP sessions unstable when TCP packets received from same source to multiple local ad-dresses.
CSCvo47319 N9K-X9736C-FX's /35 and /36 ports not coming up with QSFP-100G-SR4-S
CSCvo49074 ISIS is calculating metric for IPv6 based on worse LSP
CSCvo60539 ptp multiple high corrections while issuing "show interface transceiver details"
CSCvo67403 N9K-C9364C- transceiver shows N/A issue randomly
CSCvo89321 QSFP-100G-SR4 breakout link down if only enable one pair 25G port
CSCvp16978 IGMP v2/v3 mix: shutdown igmpv2 receivers and igmpv3 receivers are also removed from mrib oifl
CSCvp58222 Need new CLI for setting configurable MAC UP timer
CSCvp71637 Evaluation of n9k-standalone-sw for Intel 2019.1 QSR - MDS
CSCvq00916 NVE loopback flaps up and down after reload in autorecovery scenario in 7.0.3.I7.6
CSCvq03952 Procjob process does not check NULL payload of MTS messages
CSCvq16552 SNMP v3 information leaking vulnerability still found in 7.0.3.I7.6
CSCvq17082 N9K: mrouter port is not created dynamically based on dummy PIM Hellos from OTV ED
CSCvq18738 Gen 1 N9K May Not Bring Link Up When Connected To 3rd Party NIC Following Link Flap
CSCvq21473 N9K : peer port flapping and new igmp join coming will cause port oversubscription
CSCvq30041 ebgp peer no advertise local-labeled-route template inheritance does not work after process restart
CSCvq33217 SAN-PO from NPV N9k to an FC switch will not come up
CSCvq39284 Root Port in BLK state for few vlans on vpc secondary after vpc role preempt
CSCvq43582 N9K: Do not add DHCP Padding to compensate for stripped option 82 header
CSCvq44118 mcastfwd crash is seen
CSCvq45230 Removing GLC-T/GLC-TE transceiver on HIF on FEX N2K-C2232PP keeps interface down
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Caveats
20
Big ID Description
CSCvq50094 DHCP Relay feature breaks when TCAM carvings are changed.
CSCvq50525 bcm_usd crash at soc_alpm_insert
CSCvq51055 Configuring no mpls ip forwarding on one interface breaks the same interface on different module
CSCvq51399 Packet loss reported when upgrading a cloud scale switch in A-A FEX to i7.6
CSCvq53750
N9K-EX : no shut of admin down port leads to fatal error in device DEV_SUGARBOWL_ASIC error message
CSCvq54267 Increase NTP MD5 authentication-key string length limit to 32 characters
CSCvq56189 DHCP request with BCAST flag set may result in control plane failure
CSCvq58618 EPLD Upgrade failure on N9K-SUP-A
CSCvq61369 N9K encapsulates with incorrect/null source IP address and MAC address
CSCvq65989 Link flap may cause port down
CSCvq66111 pixm crashed after dvif exhausted with multiple fex reconnected
CSCvq66390 prevent tac-pac running when the user is not network-admin
CSCvq66637 Sflow sampling rate is double for Sflow when rate is set to 65536
CSCvq68541 vxlan multisite-Routes not advertised to peer on border gateways
CSCvq72003 N9K FCoE hosts in a chassis connected over FIP bridge are impacted when a single host resets
CSCvq72707 NX BGP: md5 does not work if vrf name is more than 19 character
CSCvq73077 Only the first shell:roles role is used to assign the account into Linux groups in NX-OS
CSCvq75388 Peer-link shutdown delayed on Secondary after shutting down VPC domain on Primary.
CSCvq79204 N9K-C9364 running 7.0(3)I7(5) crash due to "tahusd"
CSCvq90051 "policyelem" process crash when configure n9k via NX-API REST
CSCvq90926 L3VNI Overlap VRF name under "show nve vni"
CSCvq91480 Address 9500 SC EOBC Reloads
CSCvq93279 New ACL entry on some SVIs could not be loaded to the hardware
CSCvq93802 FHS config lost by upgrading from old version to 9.2(4) or 9.3(1)
CSCvq95571 N9K: Radius authentication fails after reload/upgrade when DNS is used.
CSCvq96035 Nexus 9500 - vPC Auto-Recovery starts after System Switchover
CSCvr04178 not able to configure max igmp snooping group-timeout 10080
CSCvr05025 Port-channel member ports will cost TCAM entries as well as port-channel
CSCvr05981 Unexpected Config Refresh removes member vni configs
CSCvr07886 Some interfaces are down following a disruptive upgrade from 9.2.3 to 9.3.1
CSCvr07960 N9k allows upgrade when MD5 hash of image file does not match original leading to boot loop
CSCvr08446 FT flow records in EX ToR switches does not have the correct STEP field set
CSCvr26376 N9300: NXA-PAC-1100W-P series PS might not work if connected to same ATS
CSCvr31635 Crash at the moment of collecting stats for TAHUSD process
CSCvr32752
Nexus 93180LC-EX crashes due to tahusd process in disruptive upgrade from 7.0(3)I7(1) to 7.0(3)I7(6)
CSCvr45143 Fatal SAP 28 pile up post SNMP crashes
CSCvr45179 SNMP crash seen due to corrupted TLV
CSCvr52075 Not able to configure ERSPAN source on FEX port
CSCvr54760
Packets looping on internal ports of LC and FM after replacing N9K-X97160YC-EX with N9K-X9736C-FX
CSCvr80704 Configure replace fails when 'switchport trunk allowed vlan' list is too large
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Open Caveats Cisco NX-OS Release 9.3(2)
21
Open Caveats Cisco NX-OS Release 9.3(2)
The following table lists the open caveats in the Cisco NX-OS Release 9.3(2). Click the bug ID to access the Bug Search
tool and see additional information about the bug.
Table 23 Open Caveats in Cisco NX-OS Release 9.3(2)
Bug ID Description
CSCvf75978 Storm control counters not incrementing
CSCvj63603 OC ACL: delete ipv4 ace with hop-limit configs fails
CSCvk14945 CRC seen on links with Dual speed BiDi & 40g BiDi optics.
CSCvm11554 PTP High correction on slave when master have SVI which have IGMP Connected Group
Membership
CSCvn07656 ACL Stats - Packet hitting an ACE entry with log option will be counted twice
CSCvn22609 vlan counters should display L3 counters info
CSCvo30543 EOR/FX:FT latency max out issue started appearing
CSCvo32688 Generate Error message for FHS policy, When lable are not available.
CSCvp20546 Multiste EVPN Scale-after multiple flaps of NVE mac address is out of sync between BGP and L2RIB
CSCvp75031 Nexus 9300 - Block CLI to configure sub-interface with 40G uplink ports
CSCvq15147 Interface BW not accounting unicast BW after SSO switchover
CSCvq33024 TRM Multisite: traffic drop on BGW after restarting ngmvpn
CSCvq36718 Affinity, mask, priority and record route CLI's are not generated under LSP Attribute
CSCvq44103 25g AOC/LR/SR Cable type is shown as unknown
CSCvr58479 The host specific routes (IP-MAC) may stay in BGP after corresponding SVI removed
CSCvr75903
After reload N9500 Chassis, sometimes aclmgr fails to lookup fib for pbr and leads sequence
timeout
CSCvr76803 Netstack core seen in non-destructive ISSU using FQDN for NTP
Known Behaviors Cisco NX-OS Release 9.3(2)
The following known behaviors are in this release:
Table 2 Known Behaviors in Cisco NX-OS Release 9.3(2)
Bug ID Description
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Known Behaviors Cisco NX-OS Release 9.3(2)
22
Bug ID Description
CSCvc95008 On Cisco Nexus 9300-EX, 9348GC-FXP, 93108TC-FX, 93180YC-FX, 9336C-FX2,
93216TC-FX2, 93360YC-FX2, 93240YC-FX2, 92348GC-X, C93108TC-EX-24,
C93108TC-FX-24, C93180YC-EX-24, and C93180YC-FX-24 switches, when 802.1q
EtherType has changed on an interface, the EtherType of all interfaces on the same slice will be changed to the configured value. This change is not persistent after a reload of the switch and will revert to the EtherType value of the last port on the slice.
Behavior Changes for Cisco Nexus 9504 and 9508 Switches with -R Line Cards
Interface Behavior Changes
■ The output format for the exec command CLI show vpc orphan-ports has changed from the 7.0(3)F3(4)
release to the 9.3(2) release.
FEX Behavior Changes
■ MTU 9216 is the default value for FEX fabric ports-channels.
■ MTU 9216 is the only allowed value to be configured on FEX fabric port-channels. Configuring any other value
will throw an error.
■ If the MTU value on a FEX fabric port-channel was set to 9216 before upgrading to Cisco NX-OS Release
9.3(2), the show running config command will not display the MTU config as it is the new default in Cisco NX-
OS Release 9.3(2). Due to this, the show running-config diff command displays the difference which is
expected. Refer to CSCvp87914.
Programmability Behavior Changes
■ Release 9.3(2) brings in a new kernel and new processes.
■ Interface counter statistics are grouped together in the XML/JSON output. The output for the show interface-
counters command in JSON format has changed/
■ NX-API does not support insecure HTTP by default.
■ NX-API does not support weak TLSv1 protocol by default.
Security Behavior Changes
■ Stronger ciphers are used in this release.
■ A new command, no service password-recovery is supported.
■ Only one version out of v4 and v6 versions of the uRPF command can be configured on an interface. If one
version is configured, all the mode changes must be done by the same version. The other version is blocked on
that interface. Cisco Nexus 9300-EX, 9300-FX, and 9300-FX2 platform switches do not have this limitation and
you can configure v4 and v6 version of urpf cmd individually.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
23
General Known Behaviors
■ When large files, for example NX-OS, images are copied to USB, the following message is printed:
2019 Jul 2 15:49:47 Molti_A %$ VDC-1 %$ Jul 2 15:49:46 %KERN-3-SYSTEM_MSG: [ 8032.291555] INFO:
task vsh.bin:9418 blocked for more than 120 seconds. kernel
2019 Jul 2 15:49:47 Molti_A %$ VDC-1 %$ Jul 2 15:49:46 %KERN-3-SYSTEM_MSG: [ 8032.291560]
Tainted: P O 4.1.21-WR8.0.0.28-standard #1 - kernel
2019 Jul 2 15:49:47 Molti_A %$ VDC-1 %$ Jul 2 15:49:46 %KERN-3-SYSTEM_MSG: [ 8032.291561] "echo 0 >
/proc/sys/kernel/hung_task_timeout_secs" disables this message. - kernel
As long as these messages correspond to a copy operation to USB, this message can be ignored.
■ In the NX-API sandbox, whenever XML or JSON output is generated for the show run command or the show
startup command, the output contains additional characters.
For example,
</nf:source> <============nf: is extra
<namespace> : extra characters are seen with XML and JSON from NX-API.
=============================
Upgrade Instructions
To perform a software upgrade, follow the installation instructions in the Cisco Nexus 9000 Series NX-OS Software
Upgrade and Downgrade Guide, Release 9.2(x).
Note:
You can perform a standard In-Service Software Upgrade (ISSU) from the following release to Cisco NX-OS Release
9.3(2):
o 9.3(1)
o 9.2(4)
o 9.2(3)
o 9.2(2)
o 9.2(1)
o 7.0(3)I7(7)
o 7.0(3)I7(6)
o 7.0(3)I7(5)
o 7.0(3)I7(4)
For a previous release, see the Cisco NX-OS ISSU Support application.
Note: Enhanced ISSU to Cisco NX-OS Release 9.3(2) is not supported as there are kernel fixes that cannot take effect with-
out reloading the underlying kernel.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
24
■ Enhanced ISSU: Enhanced ISSU to Cisco NX-OS Release 9.3(2) is not supported as there are kernel fixes that
cannot take effect without reloading the underlying kernel. However, enhanced ISSU from Cisco NX-OS Release
9.3(2) to later releases is supported, even in cases of kernel incompatibility.
■ When downgrading from the Cisco NX-OS Release 9.3(2) to earlier releases, any ACL with the statistics per-
entry command enabled and applied as RACL needs the statistics per-entry command removed from the
running configuration before downgrading. Otherwise, the interfaces on which this ACL is applied as a RACL will
be error disabled after the downgrade.
■ When downgrading from the Cisco NX-OS Release 9.3(2) to earlier releases, make sure that the ACL TCAM
usage for ingress features does exceed the allocated TCAM space in the absence of the label sharing feature.
Label sharing is a new feature in Cisco NX-OS Release 9.3(2). Otherwise, interfaces with RACLs that could not
fit in the TCAM will be disabled after the downgrade.
■ When upgrading from Cisco NX-OS Release 9.2(2) or earlier releases to Cisco NX-OS Release 9.3(2), you need to
make sure that ingress RACL TCAM region is not more than 50% full. Otherwise, the atomic update feature will be
enabled after the upgrade and interfaces with RACLs that exceed 50% of TCAM allocation will remain down.
■ When upgrading from Cisco NX-OS Releases 7.0(3)I4(8), 7.0(3)I5(3), and 7.0(3)I6(1) to Cisco NX-OS Release 9.3(2)
results in a disruptive upgrade. If syncing images to standby SUP failed during the disruptive upgrade from Cisco
NX-OS Releases 7.0(3)I4(8), 7.0(3)I5(3,) or 7.0(3)I6(1) to 9.3(2), you should manually copy the image to the standby
SUP and perform the disruptive upgrade.
■ When upgrading to Cisco NX-OS Release to 9.3(2) from any release prior to 7.0(3)I2(3) an intermediate upgrade to
7.0(3)I4(x), 7.0(3)I5(x), 7.0(3)I6(x), or 7.0(3)I7(x) is required. We recommend using Cisco NX-OS Release
7.0(3)I4(8) or 7.0(3)I7(4) as the interim release to aid in a smooth migration. For further details, please refer to
CSCvk66763.
■ When upgrading from Cisco NX-OS Release 7.0(3)I6(1) or 7.0(3)I7(1) to Cisco NX-OS Release 9.3(2), if the Cisco
Nexus 9000 Series switches are running vPC and they are connected to an IOS-based switch via Layer 2 vPC, there
is a likelihood that the Layer 2 port channel on the IOS side will become error disabled. The workaround is to disable
the spanning-tree etherchannel guard misconfig command on the IOS switch before starting the upgrade process.
Once both the Cisco Nexus 9000 Series switches are upgraded, you can re-enable the command. For more
information, see defect CSCvg05807.
■ If you are upgrading from Cisco NX-OS Release 7.0(3)I5(2) to Cisco NX-OS Release 9.3(2) using the install all
command, BIOS will not be upgraded due to CSCve24965. When the upgrade to Cisco NX-OS Release 9.3(2) is
complete, use the install all command again to complete the BIOS upgrade, if applicable.
An upgrade performed via the install all command for Cisco NX-OS Release 7.0(3)I2(2b) to Release 9.3(2) might ■
result in the VLANs being unable to be added to the existing FEX HIF trunk ports. To recover from this, the following
steps should be performed after all FEXs have come online and the HIFs are operationally up:
1. Enter the copy run bootflash:fex_config_restore.cfg command at the prompt.
2. Enter the copy bootflash:fex_config_restore.cfg running-config echo-commands command at the
prompt.
■ In Cisco NX-OS Release 7.0(3)I6(1) and earlier, performing an ASCII replay or running the copy file run command
on a FEX HIF configuration requires manually reapplying the FEX configuration after the FEX comes back up.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
25
■ When upgrading to Cisco NX-OS Release 9.3(2) from 7.0(3)I2(x) or before and running EVPN VXLAN configuration,
an intermediate upgrade to 7.0(3)I4(x) or 7.0(3)I5(x) or 7.0(3)I6(x) is required. For further details, please refer to
CSCvh02777.
■ Before enabling the FHS on the interface, we recommend that you carve the ifacl TCAM region on Cisco Nexus 9300
and 9500 platform switches. If you carved the ifacl TCAM region in a previous release, you must reload the system
after upgrading to Cisco NX-OS Release 9.3(2). Uploading the system will create the required match qualifiers for
the FHS TCAM region, ifacl.
■ Before enabling the FHS, we recommend that you carve the ing-redirect TCAM region on Cisco Nexus 9200 and
9300-EX platform switches. If you carved the ing-redirect TCAM region in a previous release, you must reload the
system after upgrading to Cisco NX-OS Release 9.3(2). Uploading the system will create the required match
qualifiers for the FHS TCAM region, ing-redirect.
■ An error occurs when you try to perform an ISSU if you changed the reserved VLAN without entering the copy
running-config save-config and reload commands.
■ During an ISSU, there is a drop for all traffic to and from 100 Mb ports 65-66 on the Cisco Nexus 92304QC switch.
■ The install all command is the recommended method for software upgrades and downgrades because it performs
configuration compatibility checks and BIOS upgrades automatically. In contrast, changing the boot variables and
reloading the device bypasses these checks and the BIOS upgrade and therefore it is not recommended.
■ Upgrading from Cisco NX-OS Release 7.0(3)I1(2), Release 7.0(3)I1(3), or Release 7.0(3)I1(3a) requires installing a
patch for Cisco Nexus 9500 platform switches only. For more information on the upgrade patch, see Patch Upgrade
Instructions.
■ When upgrading to Cisco NX-OS Release 9.3(2), Guest Shell automatically upgrades from 1.0 to 2.0. In the process,
the contents of the guest shell 1.0 root filesystem are lost. To keep from losing important content, copy any needed
files to /bootflash or an off-box location before upgrading to Cisco NX-OS Release 9.3(2).
■ An ISSU can be performed only from a Cisco NX-OS Release 7.0(3)I4(1) to a later image.
■ While performing an ISSU, VRRP and VRRPv3 displays the following messages:
o If VRRPv3 is enabled:
2015 Dec 29 20:41:44 MDP-N9K-6 %$ VDC-1 %$ %USER-0-SYSTEM_MSG: ISSU ERROR: Service
"vrrpv3" has sent the following message: Feature vrrpv3 is configured. User can change
vrrpv3 timers to 120 seconds or fine tune these timers based on upgrade time on all Vrrp
Peers to avoid Vrrp State transitions. sysmgr
o If VRRP is enabled:
2015 Dec 29 20:45:10 MDP-N9K-6 %$ VDC-1 %$ %USER-0-SYSTEM_MSG: ISSU ERROR: Service "vrrp-
eng" has sent the following message: Feature vrrp is configured. User can change vrrp
timers to 120 seconds or fine tune these timers based on upgrade time on all Vrrp Peers to
avoid Vrrp State transitions. sysmgr
■ Guest Shell is disabled during an ISSU and reactivated after the upgrade. Any application running in the Guest
Shell will be affected.
■ If you have ITD probes configured, you need to disable the ITD service (using the shutdown command) before
upgrading to Cisco NX-OS Release 9.3(2). After the upgrade, enter the feature sla sender command to enable
IP SLA for ITD probes and then the no shutdown command to re-enable the ITD service. (If you upgrade
without shutting down the service, you can enter the feature sla sender command after the upgrade.)
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
26
Upgrade Paths to Release 9.3(2) from 7.0(3)F3(x) Releases
The following are the upgrade paths from previous 7.0(3)F3(x) releases:
■ Release 7.0(3)F3(x) -> Release 7.0(3)F3(4) -> Release 9.3(2)
NOTE: This upgrade is disruptive.
Patch Upgrade Instructions
■ Upgrading from Cisco NX-OS Release 7.0(3)I1(2), 7.0(3)I1(3), or 7.0(3)I1(3a) requires installing a patch and
then upgrading using the install all command. Failing to follow this requirement requires console access to
recover.
■ Upgrading from Cisco NX-OS Release 7.0(3)1(2), 7.0(3)I1(3), or 7.0(3)I1(3a) to 9.3(2) requires a patch for
modular switches. A patch is available for each respective release. Please see the respective links below.
■ When upgrading from Cisco NX-OS Release 7.0(3)I1(1) or earlier, including all variants of 6.1(2) based releases,
a patch is not required. You can upgrade directly using the install all command.
Note: The patch is only for upgrading. After the upgrade, the patch is automatically removed. If you decide not to
upgrade after installing the patch, do not deactivate it. Deactivating the patch may cause a bios_daemon crash.
Cisco NX-OS Release 7.0(3)I1(2) Upgrade Patch
https://software.cisco.com/download/special/release.html?config=ea82d4567eeb829ad4f32ae29c627cfc
Cisco NX-OS Release 7.0(3)I1(3) Upgrade Patch
https://software.cisco.com/download/special/release.html?config=e3e68dd1e8db9633978e080b9b715df8
Cisco NX-OS Release 7.0(3)I1(3a) Upgrade Patch
https://software.cisco.com/download/special/release.html?config=0f2015eebc7ea0d606441171b4a3baf2
To upgrade with the patch:
1. Add the patch.
2. Install the patch.
3. Commit the patch.
4. Upgrade using the install all command.
The following table is an example of a patch upgrade:
switch(config)# install add bootflash:n9000-dk9.7.0.3.I1.2.CSCuy16604.bin
Install operation 16 completed successfully at Thu Mar 3 04:24:13 2016
switch(config)# install add bootflash:n9000-dk9.7.0.3.I1.2.CSCuy16606.bin
Install operation 17 completed successfully at Thu Mar 3 04:24:43 2016
switch(config)# install activate n9000-dk9.7.0.3.I1.2.CSCuy16604.bin
Install operation 18 completed successfully at Thu Mar 3 04:28:38 2016
switch (config)# install activate n9000-dk9.7.0.3.I1.2.CSCuy16606.bin
Install operation 19 completed successfully at Thu Mar 3 04:29:08 2016
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
27
switch(config)# install commit n9000-dk9.7.0.3.I1.2.CSCuy16604.bin
Install operation 20 completed successfully at Thu Mar 3 04:30:38 2016
switch (config)# install commit n9000-dk9.7.0.3.I1.2.CSCuy16606.bin
Install operation 21 completed successfully at Thu Mar 3 04:31:16 2016
switch (config)# install all nxos bootflash:Nxos.9.2.3.bin
Installer will perform compatibility check first. Please wait.
uri is: /Nxos.9.2.3.bin
Installer is forced disruptive
Verifying image bootflash:/Nxos.9.2.3.bin for boot variable "nxos".
[####################] 100% -- SUCCESS
Verifying image type.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "bios" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
28
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "nxos" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Preparing "lcn9k" version info using image bootflash:/Nxos.9.2.3.bin.
[####################] 100% -- SUCCESS
Performing module support checks.
[####################] 100% -- SUCCESS
Notifying services about system upgrade.
[####################] 100% -- SUCCESS
Compatibility check is done:
Module bootable Impact Install-type Reason
------ -------- -------------- ------------ ------
1 yes disruptive reset Incompatible image
6 yes disruptive reset Incompatible image
8 yes disruptive reset Incompatible image
9 yes disruptive reset Incompatible image
10 yes disruptive reset Incompatible image
11 yes disruptive reset Incompatible image
14 yes disruptive reset Incompatible image
15 yes disruptive reset Incompatible image
16 yes disruptive reset Incompatible image
21 yes disruptive reset Incompatible image
22 yes disruptive reset Incompatible image
23 yes disruptive reset Incompatible image
24 yes disruptive reset Incompatible image
25 yes disruptive reset Incompatible image
26 yes disruptive reset Incompatible image
27 yes disruptive reset Incompatible image
28 yes disruptive reset Incompatible image
29 yes disruptive reset Incompatible image
30 yes disruptive reset Incompatible image
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
29
Images will be upgraded according to following table:
Module Image Running-Version(pri:alt) New-Version Upg-Required
------ ---------- ---------------------------------------- -------------------- ------------
1 lcn9k 7.0(3)I1(2) 9.3(2) yes
1 bios v01.42(00:v01.42(00 v01.48(00 yes
6 lcn9k 7.0(3)I1(2) 9.3(2) yes
6 bios v01.48(00:v01.48(00 v01.48(00 no
8 lcn9k 7.0(3)I1(2) 9.3(2) yes
8 bios v01.48(00:v01.29(00 v01.48(00 no
9 lcn9k 7.0(3)I1(2) 9.3(2) yes
9 bios v01.48(00:v01.35(00 v01.48(00 no
10 lcn9k 7.0(3)I1(2) 9.3(2) yes
10 bios v01.48(00:v01.42(00 v01.48(00 no
11 lcn9k 7.0(3)I1(2) 9.3(2) yes
11 bios v01.48(00:v01.52(00 v01.48(00 no
14 lcn9k 7.0(3)I1(2) 9.3(2) yes
14 bios v01.48(00:v01.48(00 v01.48(00 no
15 lcn9k 7.0(3)I1(2) 9.3(2) yes
15 bios v01.48(00:v01.40(00 v01.48(00 no
16 lcn9k 7.0(3)I1(2) 9.3(2) yes
16 bios v01.48(00:v01.42(00 v01.48(00 no
21 lcn9k 7.0(3)I1(2) 9.3(2) yes
21 bios v01.48(00:v01.42(00 v01.48(00 no
22 lcn9k 7.0(3)I1(2) 9.3(2) yes
22 bios v01.48(00:v01.40(00 v01.48(00 no
23 lcn9k 7.0(3)I1(2) 9.3(2) yes
23 bios v01.48(00:v01.40(00 v01.48(00 no
24 lcn9k 7.0(3)I1(2) 9.3(2) yes
24 bios v01.48(00:v01.40(00 v01.48(00 no
25 lcn9k 7.0(3)I1(2) 9.3(2) yes
25 bios v01.48(00:v01.40(00 v01.48(00 no
26 lcn9k 7.0(3)I1(2) 9.3(2) yes
26 bios v01.48(00:v01.40(00 v01.48(00 no
27 nxos 7.0(3)I1(2) 9.3(2) yes
27 bios v08.06(09/10/2014):v08.18(08/11/2015) v08.26(01/12/2016) yes
28 nxos 7.0(3)I1(2) 9.3(2) yes
28 bios v08.06(09/10/2014):v08.26(01/12/2016) v08.26(01/12/2016) yes
29 lcn9k 7.0(3)I1(2) 9.3(2) yes
29 bios v01.48(00:v01.35(00 v01.48(00 no
30 lcn9k 7.0(3)I1(2) 9.3(2) yes
30 bios v01.48(00:v01.35(00 v01.48(00 no
Switch will be reloaded for disruptive upgrade.
Do you want to continue with the installation (y/n)? [n] y
Install is in progress, please wait.
Performing runtime checks.
[####################] 100% -- SUCCESS
Syncing image bootflash:/Nxos.9.2.3.bin to standby.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
30
[####################] 100% -- SUCCESS
Setting boot variables.
[####################] 100% -- SUCCESS
Performing configuration copy.
[####################] 100% -- SUCCESS
Module 1: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 6: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 8: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 9: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 10: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 11: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 14: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 15: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 16: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 21: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 22: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
31
Module 23: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 24: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 25: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 26: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 27: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 28: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 29: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Module 30: Refreshing compact flash and upgrading bios/loader/bootrom.
Warning: please do not remove or power off the module at this time.
[####################] 100% -- SUCCESS
Finishing the upgrade, switch will reboot in 10 seconds.
switch(config)#
User Access Verification
switch login: [ 2644.917727] [1456980048] writing reset reason 88,
CISCO SWITCH Ver 8.26
CISCO SWITCH Ver 8.26
Memory Size (Bytes): 0x0000000080000000 + 0x0000000380000000
Relocated to memory
Time: 6/3/2016 4:41:8
Detected CISCO IOFPGA
Booting from Primary Bios
Code Signing Results: 0x0
Using Upgrade FPGA
FPGA Revision : 0x27
FPGA ID : 0x1168153
FPGA Date : 0x20160111
Reset Cause Register: 0x22
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
32
Boot Ctrl Register : 0x60ff
EventLog Register1 : 0x2000000
EventLog Register2 : 0xfbe77fff
Version 2.16.1240. Copyright (C) 2013 American Megatrends, Inc.
Board type 1
IOFPGA @ 0xe8000000
SLOT_ID @ 0x1b
Standalone chassis
check_bootmode: grub: Continue grub
Trying to read config file /boot/grub/menu.lst.local from (hd0,4)
Filesystem type is ext2fs, partition type 0x83
Booting bootflash:/Nxos.9.2.3.bin ...
Booting bootflash:/Nxos.9.2.3.bin
Trying diskboot
Filesystem type is ext2fs, partition type 0x83
IOFPGA ID: 1168153
Image valid
Image Signature verification was Successful.
Boot Time: 3/3/2016 4:41:44
INIT: version 2.88 booting
Unsquashing rootfs ...
Loading IGB driver ...
Installing SSE module ... done
Creating the sse device node ... done
Loading I2C driver ...
Installing CCTRL driver for card_type 3 ...
CCTRL driver for card_index 21000 ...
old data: 4000004 new data: 1
Not Micron SSD...
Checking all filesystems.......
Installing default sprom values ...
done.Configuring network ...
Installing LC netdev ...
Installing psdev ...
Installing veobc ...
Installing OBFL driver ...
mounting plog for N9k!
tune2fs 1.42.1 (17-Feb-2012)
Setting reserved blocks percentage to 0% (0 blocks)
Starting portmap daemon...
creating NFS state directory: done
starting 8 nfsd kernel threads: done
starting mountd: done
starting statd: done
Saving image for img-sync ...
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
33
Loading system software
Installing local RPMS
Patch Repository Setup completed successfully
dealing with default shell..
file /proc/cmdline found, look for shell
unset shelltype, nothing to do..
user add file found..edit it
Uncompressing system image: Thu Jun 3 04:42:11 UTC 2016
blogger: nothing to do.
..done Thu Mar 3 04:42:11 UTC 2016
Creating /dev/mcelog
Starting mcelog daemon
Overwriting dme stub lib
Replaced dme stub lib
INIT: Entering runlevel: 3
Running S93thirdparty-script...
2016 Mar 3 04:42:37 switch%$ VDC-1 %$ %USER-2-SYSTEM_MSG: <<%USBHSD-2-MOUNT>> logflash: online -
usbhsd
2016 Mar 3 04:42:37 switch%$ VDC-1 %$ Mar 3 04:42:37 %KERN-2-SYSTEM_MSG: [ 12.509615] hwport mode=6 -
kernel
2016 Mar 3 04:42:40 switch%$ VDC-1 %$ %VMAN-2-INSTALL_STATE: Installing virtual service 'guestshell+'
2016 Mar 3 04:42:40 switch%$ VDC-1 %$ %DAEMON-2-SYSTEM_MSG: <<%ASCII-CFG-2-CONF_CONTROL>>
Binary restore - ascii-cfg[13904]
2016 Mar 3 04:42:40 switch%$ VDC-1 %$ %DAEMON-2-SYSTEM_MSG: <<%ASCII-CFG-2-CONF_CONTROL>>
Restore DME database - ascii-cfg[13904]
2016 Mar 3 04:42:42 switch%$ VDC-1 %$ netstack: Registration with cli server complete
2016 Mar 3 04:43:00 switch%$ VDC-1 %$ %USER-2-SYSTEM_MSG: ssnmgr_app_init called on ssnmgr up - aclmgr
2016 Mar 3 04:43:09 switch%$ VDC-1 %$ %USER-0-SYSTEM_MSG: end of default policer - copp
2016 Mar 3 04:43:10 switch%$ VDC-1 %$ %VMAN-2-INSTALL_STATE: Install success virtual service 'guestshell+';
Activating
2016 Mar 3 04:43:10 switch%$ VDC-1 %$ %VMAN-2-ACTIVATION_STATE: Activating virtual service 'guestshell+'
2016 Mar 3 04:43:13 switch%$ VDC-1 %$ %CARDCLIENT-2-FPGA_BOOT_PRIMARY: IOFPGA booted from Primary
2016 Mar 3 04:43:18 switch%$ VDC-1 %$ %USER-2-SYSTEM_MSG: IPV6 Netlink thread init successful - icmpv6
2016 Mar 3 04:43:19 switch%$ VDC-1 %$ %VDC_MGR-2-VDC_ONLINE: vdc 1 has come online
User Access Verification
switchlogin: 2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of
Module 1
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 6
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 8
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 9
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 10
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 11
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 14
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 15
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 16
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 21
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 22
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 23
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
34
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 24
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 25
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 26
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 28
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 29
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PRESENT: Detected the presence of Module 30
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_OK: Power supply 1 ok (Serial number DTM173903QQ)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_FANOK: Fan in Power supply 1 ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_OK: Power supply 2 ok (Serial number DTM174000SB)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_FANOK: Fan in Power supply 2 ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_OK: Power supply 3 ok (Serial number DTM174000RR)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_FANOK: Fan in Power supply 3 ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_OK: Power supply 4 ok (Serial number DTM173903SH)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_FANOK: Fan in Power supply 4 ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_OK: Power supply 5 ok (Serial number DTM173903SR)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-PS_FANOK: Fan in Power supply 5 ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-FANMOD_FAN_OK: Fan module 1 (Fan1(sys_fan1) fan) ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-FANMOD_FAN_OK: Fan module 2 (Fan2(sys_fan2) fan) ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-FANMOD_FAN_OK: Fan module 3 (Fan3(sys_fan3) fan) ok
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 30 detected (Serial number
SAL1803KQ78) Module-Type System Controller Model N9K-SC-A
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 30 powered up (Serial number
SAL1803KQ78)
2016 Mar 3 04:43:52 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 28 detected (Serial number
:unavailable) Module-Type Supervisor Module Model :unavailable
2016 Mar 3 04:43:58 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 29 detected (Serial number
SAL1803KQAS) Module-Type System Controller Model N9K-SC-A
2016 Mar 3 04:43:58 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 29 powered up (Serial number
SAL1803KQAS)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 21 detected (Serial number
SAL1813NZMB) Module-Type Fabric Module Model N9K-C9516-FM
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 22 detected (Serial number
SAL1811NE36) Module-Type Fabric Module Model N9K-C9516-FM
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 21 powered up (Serial number
SAL1813NZMB)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 22 powered up (Serial number
SAL1811NE36)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 23 detected (Serial number
SAL1813P9VN) Module-Type Fabric Module Model N9K-C9516-FM
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 23 powered up (Serial number
SAL1813P9VN)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 24 detected (Serial number
SAL1811NE3U) Module-Type Fabric Module Model N9K-C9516-FM
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 24 powered up (Serial number
SAL1811NE3U)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 25 detected (Serial number
SAL1813NZNB) Module-Type Fabric Module Model N9K-C9516-FM
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 25 powered up (Serial number
SAL1813NZNB)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 26 detected (Serial number
SAL1811NE46) Module-Type Fabric Module Model N9K-C9516-FM
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
35
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 26 powered up (Serial number
SAL1811NE46)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 1. Ejector based shutdown enabled
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 1 detected (Serial number
SAL1817REUZ) Module-Type 32p 40G Ethernet Module Model N9K-X9432PQ
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 1 powered up (Serial number
SAL1817REUZ)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 9. Ejector based shutdown enabled
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 9 detected (Serial number
SAL1746G7Y3) Module-Type 48x1/10G-T 4x40G Ethernet Module Model N9K-X9564TX
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 9 powered up (Serial number
SAL1746G7Y3)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 10. Ejector based shutdown enabled
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 10 detected (Serial number
SAL1817REVT) Module-Type 32p 40G Ethernet Module Model N9K-X9432PQ
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 10 powered up (Serial number
SAL1817REVT)
2016 Mar 3 04:44:01 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 11. Ejector based shutdown enabled
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 11 detected (Serial number
SAL1820SKZ1) Module-Type 36p 40G Ethernet Module Model N9K-X9536PQ
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 11 powered up (Serial number
SAL1820SKZ1)
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 15. Ejector based shutdown enabled
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 15 detected (Serial number
SAL1812NTFC) Module-Type 36p 40G Ethernet Module Model N9K-X9536PQ
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 15 powered up (Serial number
SAL1812NTFC)
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 16. Ejector based shutdown enabled
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 16 detected (Serial number
SAL1816QGWW) Module-Type 48x1/10G SFP+ 4x40G Ethernet Module Model N9K-X9464PX
2016 Mar 3 04:44:02 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 16 powered up (Serial number
SAL1816QGWW)
2016 Mar 3 04:44:08 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 14. Ejector based shutdown enabled
2016 Mar 3 04:44:08 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 14 detected (Serial number
SAL1910AP3B) Module-Type 8p 100G Ethernet Module Model N9K-X9408PC-CFP2
2016 Mar 3 04:44:08 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 14 powered up (Serial number
SAL1910AP3B)
2016 Mar 3 04:44:09 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 6. Ejector based shutdown enabled
2016 Mar 3 04:44:09 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 6 detected (Serial number
SAL1910AP4E) Module-Type 8p 100G Ethernet Module Model N9K-X9408PC-CFP2
2016 Mar 3 04:44:09 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 6 powered up (Serial number
SAL1910AP4E)
2016 Mar 3 04:44:10 switch%$ VDC-1 %$ %PLATFORM-2-MODULE_EJECTOR_POLICY_ENABLED: All Ejectors closed
for module 8. Ejector based shutdown enabled
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Upgrade Instructions
36
2016 Mar 3 04:44:10 switch%$ VDC-1 %$ %PLATFORM-2-MOD_DETECT: Module 8 detected (Serial number
SAL1746G7Y8) Module-Type 48x1/10G-T 4x40G Ethernet Module Model N9K-X9564TX
2016 Mar 3 04:44:10 switch%$ VDC-1 %$ %PLATFORM-2-MOD_PWRUP: Module 8 powered up (Serial number
SAL1746G7Y8)
2016 Mar 3 04:44:56 switch%$ VDC-1 %$ %USBHSD-STANDBY-2-MOUNT: logflash: online
2016 Mar 3 04:47:31 switch%$ VDC-1 %$ %ASCII-CFG-2-CONF_CONTROL: System ready
2016 Mar 3 04:47:51 switch%$ VDC-1 %$ %VMAN-2-ACTIVATION_STATE: Successfully activated virtual service
'guestshell+'
2016 Mar 3 04:47:51 switch%$ VDC-1 %$ %VMAN-2-GUESTSHELL_ENABLED: The guest shell has been enabled. The
command 'guestshell' may be used to access it, 'guestshell destroy' to remove it.
User Access Verification
switch# show version
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (C) 2002-2016, Cisco and/or its affiliates.
All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under their own
licenses, such as open source. This software is provided "as is," and unless
otherwise stated, there is no warranty, express or implied, including but not
limited to warranties of merchantability and fitness for a particular purpose.
Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or
GNU General Public License (GPL) version 3.0 or the GNU
Lesser General Public License (LGPL) Version 2.1 or
Lesser General Public License (LGPL) Version 2.0.
A copy of each such license is available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://opensource.org/licenses/gpl-3.0.html and
http://www.opensource.org/licenses/lgpl-2.1.php and
http://www.gnu.org/licenses/old-licenses/library.txt.
Software
BIOS: version 08.26
NXOS: version 9.3(2)
BIOS compile time: 06/12/2016
NXOS image file is: bootflash:///Nxos.9.2.3.bin
NXOS compile time: 2/8/2016 20:00:00 [02/09/2016 05:18:17]
Hardware
cisco Nexus9000 C9516 (16 Slot) Chassis ("Supervisor Module")
Intel(R) Xeon(R) CPU E5-2403 0 @ 1.80GHz with 16401664 kB of memory.
Processor Board ID SAL1745FTPW
Device name: switch
bootflash: 20971520 kB
Kernel uptime is 0 day(s), 0 hour(s), 8 minute(s), 13 second(s)
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Downgrade Instructions
37
Last reset at 235176 usecs after Thu Mar 3 04:40:48 2016
Reason: Reset due to upgrade
System version: 7.0(3)I1(2)
Service:
plugin
Core Plugin, Ethernet Plugin
Active Package(s):
switch#
Downgrade Instructions
The only supported method of downgrading a Cisco Nexus 9000 Series switch is to utilize the install all command.
Changing the boot variables, saving the configuration, and reloading the switch is not a supported method to downgrade
the switch.
Disable the Guest Shell if you need to downgrade from Cisco NX-OS Release 9.3(2) to an earlier release.
■ Performing an ISSU downgrade from Cisco NX-OS Release 9.3(2) to Release 7.0(3)I4(1) with an FCoE (Fiber
Channel over Ethernet) NPV (N-port Virtualization) configuration causes the port channel to crash with a core
file:
[################ ] 38%2016 Apr 18 20:52:35 n93-ns1 %$ VDC-1 %$ %SYSMGR-2-
SERVICE_CRASHED: Service "port-channel" (PID 14976) hasn't caught signal 11 (core will
be saved)
■ ISSU (non-disruptive) downgrade is not supported.
■ Downgrading with PVLANs (Private VLANs) configured is only supported with Cisco NX-OS 6.1(2)I3(4x)
releases.
■ For a boot-variable change and reload to Cisco NX-OS Release 7.0(3)I1(1x), the PVLAN process is not brought
up, and the PVLAN ports are kept down. For a boot-variable change to the Cisco NX-OS Release 6.1(2)I3(3)
and earlier, an ASCII replay will be tried, but feature PVLANs and other PVLAN configurations will fail.
Software Maintenance Upgrades
on in
the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide.
Note: If you perform a software maintenance upgrade (SMU) and later upgrade your device to a new Cisco NX-OS
software release, the new image will overwrite both the previous Cisco NX-OS release and the SMU package file.
If you are going to apply the patch for the issue described in CSCvh04723, you must make sure that the ACL is deleted
before applying the patch. Otherwise, the issue will be seen again. This issue applies only to the ACL which has the
redirect keyword in it.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Limitations
38
Limitations
This section lists limitations related to Cisco NX-OS Release 9.3(2).
■ When you upgrade a Cisco Nexus 9000 device to Cisco NX-OS Release 9.3(2), if a QSFP port is configured with
the manual breakout command and is using a QSA, the configuration of the interface Ethernet 1/50/1 is no
longer supported and will need to be removed. To restore the configuration, you must manually configure the
interface Ethernet 1/50 on the device.
■ Due to the design of airflow, back-to-front fans requires fan speed to be run at full speed all the time. You might
also see fan speeds increase from 40% to 70% post-upgrade. This applies to the following PIDs: N9K-C9272Q,
N9K-C9236C, N9K-C93180YC-FX, N9K-C93180TC-FX, N9K-C9364C, N3K-C36180YC-R, N9K-C9336C-FX2,
N9K-C9332C. This change is made as of cisco NX-OS Release 7.0(3)I7(3). If your PID is not listed, please
contact Cisco TAC for additional verification.
■ PTP is not supported on the 96136YC-R line card or for line cards on the Cisco Nexus 9504 switch.
■ The following features are not supported on the Cisco Nexus 3464C and 9364C switches.
o 100 G port cannot support breakout (HW limitation)
o FEX
o ISSU
o Segment routing
o Tetration (HW limitation)
■ The following feature is not supported on the Cisco Nexus 9332C:
o uRPF
■ Only the following switches support QSFP+ with the QSFP to SFP/SFP+ adapter (40 Gb to 10 Gb):
o N9K-C93120TX
o N9K-C93128TX
o N9K-C9332PQ
o N9K-C9372PX
o N9K-C9372PX-E
o N9K-C9372TX
o N9K-C9396PX
o N9K-C93108TC-EX
o N9K-C93108TC-FX
o N9K-C93180YC-EX
o N9K-C93180YC-FX
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Unsupported Features
39
■ Note: The Cisco Nexus 9300 platforms support for the QSFP+ breakout has the following limitations:
■ 1 Gb and 10 Gb can be supported using the QSFP-to-SFP Adapter on 40-Gb uplink ports on Cisco Nexus 9300
platform switches in NX-OS.
■ For the Cisco Nexus 9332PQ switch, all ports except 13-14 and 27-32 can support breakout.
■ The following switches support the breakout cable (40 Gb ports to 4x10-Gb ports):
o N9K-C9332PQ
o N9K-X9436PQ
o N9K-X9536PQ
o N9K-C93180LC-EX last four ports are breakout capable (10x4, 24x4, 50x2)
o N9K-C93180YC-EX
o N9K-C93108TC-EX
o N9K-X9732C-EX line card
o N9K-X9732C-FX line card
o N9K-X97160YC-EX
o N9K-C93180YC-EX
o N9K-C93108TC-EX
o N9K-C93180YC-FX
o N9K-C93108TC-FX
o N9K-C9348GC-FXP
■ Limitations for ALE (Application Link Engine) uplink ports are listed at the following URL:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/ale_ports/b_Limitations_for_ALE_Upli
nk_Ports_on_Cisco_Nexus_9000_Series_Switches.html
Unsupported Features
Notes regarding unsupported features:
■ Cisco Nexus 9200, 9300-EX, and 9300-FX Platform Switches
■ Cisco Nexus 9500 Platform N9K-X9408PC-CFP2 Line Card and 9300 Platform Switches
■ N9K-X96136YC-R Line Card
■ N9K-X9736C-FX Line Card
■ Nexus 9500 Cloud Scale
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Unsupported Features
40
Cisco Nexus 9200, 9300-EX, and 9300-FX Platform Switches
The following features are not supported for the Cisco Nexus 9200 platform switches and the Cisco Nexus 93108TC-EX
and 93180YC-EX switches:
■ 64-bit ALPM routing mode
■ Cisco Nexus 9272PQ and Cisco Nexus 92160YC platforms do not support the PXE boot of the NXOS image
from the loader.
■ ACL filters to span subinterface traffic on the parent interface
Egress port ACLs ■
Egress QoS policer is supported on the Cisco Nexus 9300-EX and 9300-FX platform switches. It is not ■
supported on the Cisco Nexus 9200 platform switch. The only policer action supported is drop. Remark action is
not supported on egress policer.
FEX (supported for Cisco Nexus 9300-EX platform switches but not for Cisco Nexus 9200 platform switches.) ■
GRE v4 payload over v6 tunnels ■
■ IP length-based matches
■ IP-in-IP on Cisco Nexus 92160 switch
■ ISSU enhanced is not supported on the Cisco Nexus 9300-FX platform switch.
■ MTU (Multi Transmission Unit) checks for packets received with an MPLS header
■ NetFlow is not supported on Cisco Nexus 9200 platform switches. It is supported on Cisco Nexus 9300-EX,
9300-FX, 9300-FX2, 9500-EX LCS, and 9500-FX LCS platform switches.
■ Packet-based statistics for traffic storm control (only byte-based statistics are supported)
■ PVLANs (supported on Cisco Nexus 9300 and 9300-EX platform switches but not on Cisco Nexus 9200
platform switches)
■ Q-in-VNI is not supported on Cisco Nexus 9200 platform switches. Beginning with Cisco NX-OS Release
7.0(3)I5(1), Q-in-VNI is supported on Cisco Nexus 9300-EX platform switches.
■ Q-in-Q for VXLAN is not supported on Cisco Nexus 9200 and 9300-EX platform switches
■ Q-in-VNI is not supported on Cisco Nexus 9200 platform switches (supported on Cisco Nexus 9300-EX
platform switches)
■ Resilient hashing for ECMP on the Cisco Nexus 9200 platform switches.
■ Resilient hashing for port-channel
■ Rx SPAN for multicast if the SPAN source and destination are on the same slice and no forwarding interface is
on the slice
■ SVI uplinks with Q-in-VNI are not supported with Cisco Nexus 9300-EX platform switches
■ Traffic storm control for copy-to-CPU packets
■ Traffic storm control with unknown multicast traffic
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Unsupported Features
41
■ Tx SPAN for multicast, unknown multicast, and broadcast traffic
■ VACL redirects for TAP aggregation
Cisco Nexus 9500 Platform N9K-X9408PC-CFP2 Line Card and 9300 Platform
Switches
The following features are not supported for the Cisco Nexus 9500 platform N9K-X9408PC-CFP2 line card and Cisco
Nexus 9300 platform switches with generic expansion modules (N9K-M4PC-CFP2):
■ 802.3x
■ Breakout ports
■ FEX (this applies to the N9K-X9408PC-CFP2 and EX switches, not all Cisco Nexus 9300 platform switches)
■ MCT (Multichassis EtherChannel Trunk)
■ NetFlow
■ Only support 40G flows
■ Port-channel (No LACP)
■ PFC/LLFC
■ PTP (Precision Time Protocol)
■ PVLAN (supported on Cisco Nexus 9300 platform switches)
■ Shaping support on 100g port is limited
■ SPAN destination/ERSPAN destination IP
■ Storm Control
■ vPC
■ VXLAN access port.
N9K-X96136YC-R Line Card
The following features are not supported for the N9K-X96136YC-R line card:
■ Breakout is not supported.
■ PTP and gPTP are not supported.
N9K-X9736C-FX Line Card
The following feature is not supported for the N9K-X9736C-FX line card:
■ Ports 29-36 do not support 1 Gbps speed.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Related Documentation
42
Nexus 9500 Cloud Scale (EX/FX) Line Cards
The following features are not supported for Cisco Nexus 9500 cloud scale (EX/FX) line cards:
■ FEXs
■ IPv6 support for policy-based routing
■ LPM dual-host mode
■ SPAN port-channel destinations
Related Documentation
The entire Cisco Nexus 9000 Series NX-OS documentation set is available at the following URL:
https://www.cisco.com/c/en/us/support/switches/nexus-9000-series-switches/tsd-products-support-series-
home.html
The Cisco Nexus 3000 and 9000 Series NX-API REST SDK User Guide and API Reference is available at the following
URL:
https://developer.cisco.com/site/nx-os/docs/n3k-n9k-api-ref/
The Cisco NX-OS Supported MIBs URL:
ftp://ftp.cisco.com/pub/mibs/supportlists/nexus9000/Nexus9000MIBSupportList.html
New Documentation
The Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 9.3(2) is available at the following URL:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/93x/epld-rn/nxos_n9K_epldRN_932.html
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments to
[email protected]. We appreciate your feedback.
Obtaining Documentation and Submitting a Service Request
Product Documentation, which also lists all new and revised Cisco technical documentation, at:
https://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Open a service request online at:
https://tools.cisco.com/ServiceRequestTool/create/launch.do
Subscribe to the as a Really Simple Syndication (RSS) feed and set content
to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently
supports RSS version 2.0.
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
Obtaining Documentation and Submitting a Service Request
43
This product includes cryptographic software written by Eric Young ([email protected]). This product includes software
developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes
software written by Tim Hudson ([email protected]).
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Cisco Nexus 9000 Series NX-OS Release Notes, Release 9.3(2)
© 2019-2020 Cisco Systems, Inc. All rights reserved.