Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d)

Size: px
Start display at page:

Download "Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d)"

Transcription

1 Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d) Revised: May 21, 2011 This document describes how to upgrade the Cisco Nexus 1000V software on a Virtual Supervisor Module (VSM) virtual machine (VM) and includes the following topics: Audience, page 1 Obtaining the Software, page 2 Information About the Software Upgrade, page 2 Upgrading the VSMs, page 4 Upgrading the VEMs, page 14 Changing the Feature Support Level, page 26 Accepting the VEM Upgrade in the vcenter Client, page 28 Troubleshooting, page 29 Available Documents, page 30 Obtaining Documentation and Submitting a Service Request, page 31 Audience This guide is for network administrators and server administrators with the following experience and knowledge: An understanding of virtualization Using VMware tools to create a virtual machine and configure a vswitch A basic understanding of the following: Cisco NX-OS based CLI VMware ESX/ESXi Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA USA

2 Obtaining the Software VMware Update Manager Cisco Nexus 1000V DVS setup and implementation For more information about Cisco Nexus 1000V setup and implementation, see the Cisco Nexus 1000V Getting Started Guide, Release 4.0(4)SV1(3). Obtaining the Software Table 1 You can obtain your upgrade-related software from the following sources (Table 1): Obtaining Software Source Cisco VMware Description Download the Cisco Nexus 1000V Release 4.0(4)SV1(3d) software from the Cisco website. Download VMware software from VMware website. For information about your software and platform compatibility, see the Cisco Nexus 1000V Compatibility Information, Release 4.0(4)SV1(3d). Information About the Software Upgrade You cannot upgrade from Release 4.2(1)SV1(4) to Release 4.0(4)SV1(3d). Caution If the VMware vcenter Server is hosted on the same ESX host as a Cisco Nexus 1000V VEM, then a VUM assisted upgrade on the host will fail. You should manually vmotion the VM to another host before performing the upgrade. This section provides information about the software upgrade. A software upgrade consists of adding a new software version first to the Cisco Nexus 1000V VSM and then to its Virtual Ethernet Modules (VEMs). The sequence to upgrade the software is as follows: Upgrading the VSMs, page 4 Upgrading the VEMs, page 14 This section describes important points about the software upgrade: There are two methods of upgrading the software: the non-disruptive method and the disruptive method. An upgrade is non-disruptive or disruptive based on the version of your setup and also the method that you choose for upgrading. An ESX is termed as going through an upgrade when it is connected to a VSM during the upgrade procedure. An automated upgrade is traffic non-disruptive when you install one of the following: VMware patch ESX400/ESXi or the ESX400/ESXi UG or later on the host, and also use VMware vcenter Update Manager 4.0 Update 1 Patch 2, vcli build , and VSM Release 4.0(4)SV1(2) or later. 2

3 Information About the Software Upgrade Even if your ESX/ESXi host has patches greater than ESX/ESXi , without installing ESX/ESXi or ESX400/ESXi UG, a non-disruptive upgrade is not supported. Any ESX patches or updates after ESX400/ESXi UG will be backward compatible with the Cisco Nexus 1000V U2 VEM vib (cross_cisco-vem_v vib). VMware release ESX410/ESXi410 on the host, and also use VMware vcenter Update Manager 4.1 and VSM Release 4.0(4)SV1(3). A manual upgrade is traffic non-disruptive when the following conditions are met: While each vsphere host is attached to the Distributed virtual switch (DVS), migrate any running VMs to another host within the cluster. (As the VSM Release 4.0(4)SV1(1) cannot be Vmotioned, it must be powered off.) Place the host in maintenance mode and upgrade the VEMs. Follow the same method for other hosts in the data center. For details about how to determine what patch level you are using, refer to the Cisco Nexus 1000V Compatibility Information, Release 4.0(4)SV1(3d). Cisco does not support simultaneous VMware updates or patches in combination with Nexus 1000V upgrades. This document is designed specifically for Nexus 1000V upgrades across the same VMware platform. The upgrade process is irrevocable. After the software is upgraded, you can downgrade by removing the current installation and reinstalling the software. For details, see the "Recreating the Installation" section in the following document: Cisco Nexus 1000V Troubleshooting Guide, Release 4.0(4)SV1(3). Caution During the upgrade process, the Cisco Nexus 1000V does not support new additions of any vnics, vmnics, or new modules and does not support any configuration changes. vnic port-profile changes might render the vnic in an unusable state. If you are using a proxy server to connect the VMware Update Manager (VUM) to the Internet, you may need to disable the proxy before starting a VUM upgrade of your VEMs. In VMware versions before the VUM Update 1, the proxy prevents the VUM from communicating locally with the VSM. Therefore, automatic VEM upgrades may fail if the proxy is not disabled first. When you upgrade from Release 4.0(4)SV1(3) or Release 4.0(4)SV1(3a) to Release 4.0(4)SV1(3d), licenses apply as follows: On a Release 4.0(4)SV1(3) or Release 4.0(4)SV1(3a) VSM, you can install evaluation license files. If these evaluation licenses have not yet expired prior to the upgrade to Release 4.0(4)SV1(3d), these will be carried over after the upgrade to Release 4.0(4)SV1(3d) as is. The Release 4.0(4)SV1(3) or Release 4.0(4)SV1(3a) VSM has support for default/built-in evaluation licenses for 16 CPU sockets for a period of 60 days. If these default/built-in evaluation licenses have not yet expired before the upgrade to Release 4.0(4)SV1(3d), these will be carried over after upgrade to Release 4.0(4)SV1(3d) as is. 3

4 Upgrading the VSMs Any permanent licenses installed on a Release 4.0(4)SV1(3) or Release 4.0(4)SV1(3a) VSM will be carried over after upgrade to Release 4.0(4)SV1(3d) as is. When you upgrade from Release 4.0(4)SV1(2) to Release 4.0(4)SV1(3d), licenses apply as follows: On a Release 4.0(4)SV1(2) VSM, you cannot install evaluation license files. The Release 4.0(4)SV1(2) VSM has support for default/built-in evaluation licenses for 16 CPU sockets for a period of 60 days. If these default/built-in evaluation licenses have not yet expired before the upgrade to Release 4.0(4)SV1(3d), these will be carried over after upgrade to Release 4.0(4)SV1(3d) as is. Any permanent licenses installed on a Release 4.0(4)SV1(2) VSM will be carried over after upgrade to Release 4.0(4)SV1(3d) as is. When you upgrade from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), licenses apply as follows: On a Release 4.0(4)SV1(1) VSM, you can install evaluation license files. If these evaluation licenses have not yet expired prior to the upgrade to Release 4.0(4)SV1(3d), these will be carried over after the upgrade to Release 4.0(4)SV1(3d) as is. Any permanent licenses installed on a Release 4.0(4)SV1(1) VSM will be carried over after upgrade to Release 4.0(4)SV1(3d) as is. For more licensing details, see the Cisco Nexus 1000V License Configuration Guide, Release 4.0(4)SV1(3). Upgrading the VSMs This section describes the VSM upgrade steps. The following upgrade methods are described in the following topics: Prerequisites to Upgrading the VSMs, page 4 Upgrading the VSM from Release 4.0(4)SV1(2, 3, 3a, 3b, or 3c) to Release 4.0(4)SV1(3d), page 5 Upgrading the VSM from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), page 10 Prerequisites to Upgrading the VSMs The following are prerequisites to upgrading the VSM: You are upgrading the Cisco Nexus 1000V software to Release 4.0(4)SV1(3d). Network and server administrators coordinate the upgrade procedure with each other. The following files are available in external storage that you can access from the VSM. nexus-1000v-mz sv1.3d.bin nexus-1000v-kickstart-mz sv1.3d.bin You have saved all changes in the running configuration to the startup configuration to be preserved through the upgrade. You have saved a backup copy of the running configuration in external storage. For information about backing up a configuration file, see the Cisco Nexus 1000V System Management Configuration Guide, Release 4.0(4)SV1(3). 4

5 Upgrading the VSMs Upgrading the VSM from Release 4.0(4)SV1(2, 3, 3a, 3b, or 3c) to Release 4.0(4)SV1(3d) This section describes the VSM upgrade to Release 4.0(4)SV1(3d). For example purposes, the following procedure reflects an upgrade from Release 4.0(4)SV1(3) to Release 4.0(4)SV1(3d). This procedure is performed by the network administrator. To perform a VSM software upgrade to Release 4.0(4)SV1(3d), follow these steps: Step 1 Copy the new software release system image and kickstart image files to the bootflash file system of the active VSM. switch# dir bootflash: 154 Jan 27 15:21: ovfconfigured Mar 03 07:31: accounting.log Dec 09 13:56: lost+found/ Dec 09 13:57: nexus-1000v-kickstart-mz sv1.3.bin Dec 09 13:57: nexus-1000v-mz sv1.3.bin 4096 Dec 09 13:58: vdc_2/ 4096 Dec 09 13:58: vdc_3/ 4096 Dec 09 13:58: vdc_4/ Usage for bootflash://sup-local bytes used bytes free bytes total switch# copy scp://root@ /n1k-vsm-images/nexus-1000v-mz sv1.3d.bin bootflash: Enter vrf (If no input, current vrf 'default' is considered): root@ 's password: nexus-1000v-mz sv1.3d.bin 100% 20MB 1.1MB/s 00:19 switch# switch# copy scp://root@ /n1k-vsm-images/nexus-1000v-kickstart-mz sv1.3d.bin bootflash: Enter vrf (If no input, current vrf 'default' is considered): root@ 's password: nexus-1000v-kickstart-mz sv1.3d.bin 100% 20MB 1.1MB/s 00:19 switch# switch# dir bootflash: 154 Jan 27 15:21: ovfconfigured Mar 03 07:31: accounting.log Dec 09 13:56: lost+found/ Dec 09 13:57: nexus-1000v-kickstart-mz sv1.3.bin Jul 08 18:28: nexus-1000v-kickstart-mz sv1.3d.bin Dec 09 13:57: nexus-1000v-mz sv1.3.bin Jul 08 18:29: nexus-1000v-mz sv1.3d.bin 4096 Dec 09 13:58: vdc_2/ 5

6 Upgrading the VSMs 4096 Dec 09 13:58: vdc_3/ 4096 Dec 09 13:58: vdc_4/ Usage for bootflash://sup-local bytes used bytes free bytes total Step 2 Use the install all command to copy the Release 4.0(4)SV1(3d) images to both active and standby VSMs and to update the boot variables. If available, you can obtain the software images from an outside repository and copy it using the install all command. switch# install all system bootflash:nexus-1000v-mz sv1.3d.bin kickstart bootflash:nexus-1000v-kickstart-mz sv1.3d.bin System image sync to standby is in progress... System image is synced to standby. Kickstart image sync to Standby is in progress... Kickstart image is synced to standby. Boot variables are updated to running configuration. Step 3 Step 4 Save your configuration by copying the running configuration to the startup configuration. switch# copy r s [########################################] 100% Verify that your configuration is saved. switch# show startup-config include boot boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-1 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-1 boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-2 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-2 switch# show running-config include boot boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-1 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-1 boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-2 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-2 Step 5 Verify the VSM active and standby module status. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V active * 2 0 Virtual Supervisor Module Nexus1000V ha-standby Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3) (4)SV1(3) (4)SV1(3) (4)SV1(3) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA 6

7 Upgrading the VSMs c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f The line with the bold characters in the preceding example displays that the VSM module 2 is at Release 4.0(4)SV1(3). Step 6 Reload the standby VSM. Use module 2 in the following example because module 2 is the standby module. After reloading the standby VSM, the active VSM that is running software release 4.0(4)SV1(3), synchronizes with the standby VSM running Release 4.0(4)SV1(3d). switch# reload module 2 This command will reboot standby supervisor module. (y/n)? [n] y about to reset standby sup switch# 2010 Jul 08 09:57:42 n1000v %PLATFORM-2-PFM_MODULE_RESET: Manual restart of Module 2 from Command Line Interface 2010 Jul 08 09:57:49 n1000v %PLATFORM-2-MOD_REMOVE: Module 2 removed (Serial number T D88) 2010 Jul 08 09:57:53 n1000v %(0x436D) for service "netstack" (PID 3176): Connection timed out (110). A few sequence failures might be displayed with the preceding message. This is expected and you can ignore it. Step 7 Verify the VSM active and standby module status and software release version. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V active * 2 0 Virtual Supervisor Module Nexus1000V ha-standby Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3) (4)SV1(3d) (4)SV1(3) (4)SV1(3) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA 7

8 Upgrading the VSMs ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The lines with the bold characters in the preceding example, after the reload, display the active and standby modules and that VSM module 2, the standby module, is upgraded to Release 4.0(4)SV1(3d). Step 8 Step 9 Enter the system switchover command at the active VSM to force the standby VSM to become active and to reload the active VSM. switch# system switchover When the modules are switched over, the primary module reloads and returns as the standby VSM with the new software version. Verify the system switchover. In the following example, module 2 is the active module and module 1 is now the standby module. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3) (4)SV1(3) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The line with the bold characters in the preceding example displays that the VSM module 1 is upgraded to Release 4.0(4)SV1(3d). To change to the original status of module 1 as the active module and module 2 as the standby module, use the system switchover command one more time. Step 10 Step 11 (Optional) If you have configured non-default (jumbo) MTU settings, see the Non-default (Jumbo) MTU Settings Symptoms and Solutions section on page 30 before proceeding with VEM upgrades. Proceed to upgrade the VEMs. 8

9 For details, see the Upgrading the VEMs section on page 14. Upgrading the VSMs 9

10 Upgrading the VSMs Upgrading the VSM from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d) This section describes the VSM upgrade from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d). To perform a VSM software upgrade from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), follow these steps: This procedure is performed by the network administrator. Step 1 Step 2 Power off all VMs except the VSM. Copy the new software release system image and kickstart image files to the bootflash file system of the active VSM. switch# dir bootflash: 154 Jan 27 15:21: ovfconfigured Mar 03 07:31: accounting.log Dec 09 13:56: lost+found/ Dec 09 13:57: nexus-1000v-kickstart-mz sv1.1.bin Dec 09 13:57: nexus-1000v-mz sv1.1.bin 4096 Dec 09 13:58: vdc_2/ 4096 Dec 09 13:58: vdc_3/ 4096 Dec 09 13:58: vdc_4/ Usage for bootflash://sup-local bytes used bytes free bytes total switch#copy scp://root@ /n1k-vsm-images/nexus-1000v-mz sv1.3d.bin bootflash: Enter vrf (If no input, current vrf 'default' is considered): root@ 's password: nexus-1000v-mz sv1.3d.bin 100% 20MB 1.1MB/s 00:19 switch# switch# copy scp://root@ /n1k-vsm-images/nexus-1000v-kickstart-mz sv1.3d.bin bootflash: Enter vrf (If no input, current vrf 'default' is considered): root@ 's password: nexus-1000v-kickstart-mz sv1.3d.bin 100% 20MB 1.1MB/s 00:19 switch# switch# dir bootflash: 154 Jan 27 15:21: ovfconfigured Mar 03 07:31: accounting.log Dec 09 13:56: lost+found/ Dec 09 13:57: nexus-1000v-kickstart-mz sv1.1.bin Jan 21 18:28: nexus-1000v-kickstart-mz sv1.3d.bin Dec 09 13:57: nexus-1000v-mz sv1.1.bin Jan 21 18:29: nexus-1000v-mz sv1.3d.bin 4096 Dec 09 13:58: vdc_2/ 4096 Dec 09 13:58: vdc_3/ 4096 Dec 09 13:58: vdc_4/ Usage for bootflash://sup-local bytes used 10

11 Upgrading the VSMs bytes free bytes total Step 3 Step 4 Remove the existing system boot variable and kickstart boot variable. switch# config t switch(config)# no boot system switch(config)# no boot kickstart switch(config)# Add the new system boot variable and kickstart boot variable. switch(config)# boot system bootflash:nexus-1000v-mzg sv1.3d.bin 2009 Dec 13 15:50: n1k-av %BOOTVAR-5-IMAGE_NOTEXISTS: Warning: image nexus-1000v-mz sv1.3d.bin doesn't exist on sup Dec 13 15:51: n1k-av %BOOTVAR-5-AUTOCOPY_SUCCEED: auto-copy of file /bootflash/nexus-1000v-mz sv1.3d.bin to standby supervisor succeed switch(config)# switch(config)# boot kickstart bootflash:nexus-1000v-kickstart-mzg sv1.3d.bin 2009 Dec 13 15:54: n1k-av %BOOTVAR-5-IMAGE_NOTEXISTS: Warning: image nexus-1000v-kickstart-mz sv1.3d.bin doesn't exist on sup Dec 13 15:54: n1k-av %BOOTVAR-5-AUTOCOPY_SUCCEED: auto-copy of file /bootflash/nexus-1000v-kickstart-mz sv1.3d.bin to standby supervisor succeed switch(config)# With dual VSMs, if boot auto-copy is enabled (the default), and terminal monitor is enabled, the image is also copied to the standby VSM. Wait for the second log message to appear before proceeding with the next step. Caution Step 5 Step 6 If you are upgrading dual VSMs, then before you reload the software, make sure that the bootflash file system for the standby VSM has system and kickstart image files that are identical to those in the active VSM. If they are not identical, then the only way to recover the standby VSM is to create a new one from the ISO image and point it to the active VSM. Save the running configuration persistently through reboots and restarts by copying it to the startup configuration. switch(config)# copy running-config startup-config [########################################] 100% switch(config)# Verify that your configuration is saved. switch# show startup-config include boot boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-1 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-1 boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-2 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-2 switch# show running-config include boot boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-1 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-1 boot kickstart bootflash:/nexus-1000v-kickstart-mz sv1.3d.bin sup-2 boot system bootflash:/nexus-1000v-mz sv1.3d.bin sup-2 Step 7 Verify the VSM active and standby module status. switch# show mod Mod Ports Module-Type Model Status

12 Upgrading the VSMs 1 0 Virtual Supervisor Module Nexus1000V active * 2 0 Virtual Supervisor Module Nexus1000V ha-standby Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(1) (4)SV1(1) (4)SV1(1) (4)SV1(1) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f The lines with the bold characters in the preceding example display that VSM modules 1 and 2 are at Release 4.0(4)SV1(1). Step 8 Step 9 Reload the VSM. switch# reload This command will reboot the system. (y/n)? [n] y switch# The upgraded VSMs start up with the new software version. Verify that the VSMs are upgraded. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V active * 2 0 Virtual Supervisor Module Nexus1000V ha-standby Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(1) (4)SV1(1) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name 12

13 Upgrading the VSMs NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The lines with the bold characters in the preceding example display that VSM modules 1 and 2 are upgraded to Release 4.0(4)SV1(3d). Step 10 Step 11 (Optional) If you have configured non-default (jumbo) MTU settings, see the Non-default (Jumbo) MTU Settings Symptoms and Solutions section on page 30 before proceeding with VEM upgrades. Proceed to upgrade the VEMs. For details, see the Upgrading the VEMs section on page

14 Upgrading the VEMs Upgrading the VEMs This section lists important points about the VEM upgrade and describes the VEM upgrade process including the following topics: Prerequisites to Upgrading VEMs, page 15 Upgrading the VEMs from Release 4.0(2)SV1(2) or Release 4.0(2)SV1(3) to Release 4.0(4)SV1(3d), page 15 Upgrading the VEMs from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), page 21 Before upgrading the VEMs, note the following important points: The VEM upgrade starts when it is attached to the VSM. During the upgrade process, VEMs re-attach to the VSM. VEM software can be upgraded manually using the CLI, or upgraded automatically using VUM. VSM software can control and configure older VEM versions while continuing to support all features in the previous software version. To achieve a non-disruptive manual VEM upgrade, from Release 4.0(4)SV1(2) to 4.2(1)SV1(4), the user must vmotion the VMs out of the host that is to be upgraded, and then perform the VEM upgrade. If you are using VUM with the compatible ESX version as shown in the Cisco Nexus 1000V Compatibility Information, Release 4.0(4)SV1(3d) document, the host is automatically put in maintenance mode. An automated upgrade is traffic non-disruptive when you install one of the following: VMware patch ESX/ESXi or the ESX/ESXi UG on the host, and also use VMware vcenter Update Manager 4.0 Update 1 Patch 2, vcli build , and VSM Release 4.0(4)SV1(2) or later. Even if your ESX/ESXi host has patches greater than ESX/ESXi , without installing ESX/ESXi , a non-disruptive upgrade is not supported. VMware release ESX/ESXi410 on the host, VMware vcenter Update Manager 4.1, and VSM Release 4.0(4)SV1(3). Connectivity to the VSM can be lost during a VEM upgrade when the interfaces of a VSM VM connect to its own DVS. Connectivity between an active and standby VSM can be lost during a VEM upgrade when the VEM being upgraded provides interface connectivity to one of the VSMs. In this case, both VSMs become active and lose connectivity. To prevent this, use the following workaround: Before upgrading the VEM, power off the VSM provided with interface connectivity. The other VSM should be active. If you power off the active VSM, then the standby VSM will become active. Manually upgrade the VEM providing the interface connectivity. Restart the VSM that was shut down. If you are upgrading VEM using a Cisco Nexus 1000V bundle, follow instructions in your VMware documentation. For more details about VMware bundled software, see the Cisco Nexus 1000V Compatibility Information, Release 4.0(4)SV1(3d). 14

15 Upgrading the VEMs Caution Do not type the vemlog, vemcmd, or vempkt commands during the VEM upgrade process as it may impact the upgrade. Prerequisites to Upgrading VEMs The following are prerequisites to upgrading the VEMs: You are logged in to the VSM CLI in EXEC mode. You have already upgraded the VSM to the new software version. Network and server administrators coordinate the VEM upgrade with each other. Refer to Cisco Nexus 1000V Compatibility Information, Release 4.0(4)SV1(3d) for compatible versions of the VMware vcenter and VUM software. Upgrading the VEMs from Release 4.0(2)SV1(2) or Release 4.0(2)SV1(3) to Release 4.0(4)SV1(3d) This section describes the steps to upgrade VEMs to Release 4.0(4)SV1(3d) and includes the following topics: Upgrading the VEMs Using VMware Update Manager (VUM) to Release 4.0(4)SV1(3d), page 15 Upgrading the VEMs Manually to Release 4.0(4)SV1(3d), page 18 Upgrading the VEMs Using VMware Update Manager (VUM) to Release 4.0(4)SV1(3d) To upgrade the VEMs using VUM, follow these steps: For example purposes, the following procedure reflects an upgrade from Release 4.0(4)SV1(3) to Release 4.0(4)SV1(3d). This procedure is performed by the network administrator. Step 1 Step 2 Step 3 Power off the VMs if you are running ESX/ESXi with VMware software release prior to patch ESX400/ESXi If you are running ESX/ESXi with host maintenance mode, then you do not have to power off the VMs, because ESX will be placed in maintenance mode for the upgrade which in turn will Vmotion the VMs to another host. Coordinate with and notify the server administrator of the VEM upgrade process. switch (config)# vmware vem upgrade notify Warning: Please ensure the hosts are running compatible ESX versions for the upgrade. Refer to corresponding "Cisco Nexus 1000V and VMware Compatibility Information" guide. Verify that the upgrade notification was sent. 15

16 Upgrading the VEMs switch (config)# show vmware vem upgrade status Upgrade Status: Upgrade Availability Notified in vcenter Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Step 4 Step 5 The value of the DVS output will change depending on the vcenter version. Verify that the server administrator has accepted the upgrade in vcenter. For details about how the server administrator accepts the VEM upgrade, see the Accepting the VEM Upgrade in the vcenter Client section on page 28. Coordinate the notification acceptance with the server administrator, and after the server administrator accepts the upgrade, proceed with the VEM upgrade. switch# show vmware vem upgrade status Upgrade Status: Upgrade Accepted by vcenter Admin Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Tue May 11 07:42: Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Initiate the VUM upgrade process. vcenter locks the DVS and triggers VUM to upgrade the VEMs. Caution Before entering the following command, communicate with the server administrator to confirm that the VUM process is operational. You must enter the following command in order to update the Cisco Nexus 1000V Bundle ID on the VCenter server. switch# vmware vem upgrade proceed switch# show vmware vem upgrade status Upgrade Status: Upgrade In Progress in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): DVS: VEM BG 16

17 Upgrading the VEMs Step 6 Step 7 Step 8 If the ESX/ESXi host is using VMware patch ESX400/ESXi or ESX410/ESXi410, and if your DRS settings are enabled to allow it, VUM automatically Vmotions the VMs from the host to another host in the cluster and places the ESX/ESXi in maintenance mode to upgrade the VEM. This process is continued for other hosts in the DRS cluster until all the hosts are upgraded in the cluster. Check for the Upgrade Complete status. switch# show vmware vem upgrade status Upgrade Status: Upgrade Complete in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): Wed Mar 17 17:30: DVS: VEM BG Clear the VEM upgrade status after the upgrade process is complete. switch# vmware vem upgrade complete switch# show vmware vem upgrade status Upgrade Status: Upgrade Notification Sent Time: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the upgrade process is complete. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA 17

18 Upgrading the VEMs ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The line with the bold characters in the preceding example display that all VSMs and VEMs are upgraded to Release 4.0(4)SV1(3d). Step 9 Step 10 Determine if changing the Feature Support Level is required: If you are upgrading from Release 4.0(4)SV1(3), you have completed this procedure. If you are upgrading from Release 4.0(4)SV1(2), continue to Step 10. (Optional) Change the feature support level to enable the VSM to support all the new features in the new software version. See the Changing the Feature Support Level section on page 26 for more details. Upgrading the VEMs Manually to Release 4.0(4)SV1(3d) The manual upgrade of VEMs involves the Cisco Nexus 1000V using either VMware ESX commands, which are available on the host ESX CLI, or using the VMware vcli commands. For further details, see the Cisco Nexus 1000V VEM Software Installation and Upgrade Guide, Release 4.0(4)SV1(3d). To upgrade the VEMs manually, follow these steps: This procedure is performed by the network administrator. Step 1 Step 2 Step 3 Vmotion or power off the VMs if you are running ESX/ESXi with VMware software release prior to patch ESX400/ESXi If you are running ESX/ESXi with VMware patch ESX400/ESXi , then you do not need to power off the VMs. However, the host must be manually placed in maintenance mode before the VEM upgrade. Coordinate with and notify the server administrator of the VEM upgrade process. switch (config)# vmware vem upgrade notify vmware vem upgrade notify Warning: Please ensure the hosts are running compatible ESX versions for the upgrade. Refer to corresponding "Cisco Nexus 1000V and VMware Compatibility Information" guide. Verify that the upgrade notification was sent. switch (config)# show vmware vem upgrade status Upgrade Status: Upgrade Availability Notified in vcenter Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG 18

19 Upgrading the VEMs Step 4 Step 5 Verify that the server administrator has accepted the upgrade in vcenter Server. For details about the server administrator accepting the VEM upgrade, see the Accepting the VEM Upgrade in the vcenter Client section on page 28. After the server administrator accepts the upgrade, proceed with the VEM upgrade. switch# show vmware vem upgrade status Upgrade Status: Upgrade Accepted by vcenter Admin Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Tue May 11 07:42: Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Initiate the manual upgrade process. If VUM is enabled in the vcenter environment, disable it before entering the vmware vem upgrade proceed command to prevent the new VIBs from being pushed to all the hosts. Enter the vmware vem upgrade proceed command so that the Cisco Nexus 1000V Bundle ID on the vcenter Server gets updated. If VUM is enabled and you do not update the Bundle ID, an incorrect VIB version is pushed to the VEM when you next add the ESX to VSM. switch# vmware vem upgrade proceed switch# show vmware vem upgrade status Upgrade Status: Upgrade In Progress in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): DVS: VEM BG Step 6 Step 7 Check for the Upgrade Complete status. switch# show vmware vem upgrade status Upgrade Status: Upgrade Complete in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): Wed Mar 17 17:28: DVS: VEM BG Coordinate with and wait until the server administrator upgrades all ESX host VEMs with the new VEM software release and informs you that the upgrade process is complete. The server administrator performs the manual upgrade using the vihostupdate command or the ESX/ESXi update. For details about manually installing the VEM software, see the Cisco Nexus 1000V VEM Software Installation and Upgrade Guide, Release 4.0(4)SV1(3d). 19

20 Upgrading the VEMs Step 8 Step 9 Clear the VEM upgrade status after the upgrade process is complete. switch# vmware vem upgrade complete switch# show vmware vem upgrade status Upgrade Status: Upgrade Notification Sent Time: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the upgrade process is complete. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The line with the bold characters in the preceding example display that all VSMs and VEMs are upgraded to Release 4.0(4)SV1(3d). Step 10 Step 11 Determine if changing the Feature Support Level is required: If you are upgrading from Release 4.0(4)SV1(3), you have completed this procedure. If you are upgrading from Release 4.0(4)SV1(2), continue to Step 11. (Optional) Change the feature support level to enable the VSM to support all the new features in the new software version. See the Changing the Feature Support Level section on page 26 for more details. 20

21 Upgrading the VEMs from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d) Upgrading the VEMs This section describes the steps to upgrade VEMs from Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d) and includes the following topics: Upgrading the VEMs Using VMware Update Manager (VUM): Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), page 21 Upgrading the VEMs Manually: Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), page 23 Upgrading the VEMs Using VMware Update Manager (VUM): Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d) To upgrade the VEMs using VUM, follow these steps: This procedure is performed by the network administrator. Before proceeding with the upgrade, make sure the VMs are powered off. Caution This upgrade is only applicable when VSM is not hosted on VEMs that are being upgraded. If the VSM is hosted on a VEM, proceed to the Upgrading the VEMs Manually: Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d), page 23 Step 1 Step 2 Step 3 Coordinate with and notify the server administrator of the VEM upgrade process. switch (config)# vmware vem upgrade notify Warning: Please ensure the hosts are running compatible ESX versions for the upgrade. Refer to corresponding "Cisco Nexus 1000V and VMware Compatibility Information" guide. Verify that the upgrade notification was sent. switch (config)# show vmware vem upgrade status Upgrade Status: Upgrade Availability Notified in vcenter Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the server administrator has accepted the upgrade in vcenter Server. For details about the server administrator accepting the VEM upgrade, see the Accepting the VEM Upgrade in the vcenter Client section on page 28. Coordinate the notification acceptance with the server administrator, and after the server administrator accepts the upgrade, proceed with the VEM upgrade. switch# show vmware vem upgrade status Upgrade Status: Upgrade Accepted by vcenter Admin Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Tue May 11 07:42:

22 Upgrading the VEMs Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Step 4 After the server administrator accepts the upgrade, proceed with the VEM upgrade. Initiate the VUM upgrade process. vcenter locks the DVS and triggers VUM to upgrade the VEMs. Enter the vmware vem upgrade proceed command to update the Cisco Nexus 1000V Bundle ID on the vcenter Server. If you do not update the Bundle ID, an incorrect VIB version is pushed to the VEM when you next add an ESX to the VSM. switch# vmware vem upgrade proceed switch# show vmware vem upgrade status Upgrade Status: Upgrade In Progress in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): DVS: VEM BG Step 5 Step 6 Step 7 Check for the Upgrade Complete status. switch# show vmware vem upgrade status Upgrade Status: Upgrade Complete in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): Wed Mar 17 17:30: DVS: VEM BG Clear the VEM upgrade status after the upgrade process is complete. switch# vmware vem upgrade complete switch# show vmware vem upgrade status Upgrade Status: Upgrade Notification Sent Time: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the upgrade process is complete. switch# show mod Mod Ports Module-Type Model Status 22

23 Upgrading the VEMs Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session The line with the bold characters in the preceding example display that all VSMs and VEMs are upgraded to Release 4.0(4)SV1(3d). Step 8 Step 9 Change the feature support level to enable the VSM to support all the new features in the new software version. See the Changing the Feature Support Level section on page 26 for more details. Power on the VMs. Upgrading the VEMs Manually: Release 4.0(4)SV1(1) to Release 4.0(4)SV1(3d) The manual upgrade of VEMs involves the Cisco Nexus 1000V either using VMware ESX commands that are available on the host ESX CLI or using the VMware vcli commands. For more details, see also the Cisco Nexus 1000V VEM Software Installation and Upgrade Guide, Release 4.0(4)SV1(3d). To upgrade the VEMs manually, perform the following steps as network administrator: This procedure is performed by the network administrator. Before proceeding with the upgrade, make sure the VMs are powered off. Step 1 Coordinate with and notify the server administrator of the VEM upgrade process. switch (config)# vmware vem upgrade notify Warning: Please ensure the hosts are running compatible ESX versions for the upgrade. Refer to corresponding "Cisco Nexus 1000V and VMware Compatibility Information" guide. 23

24 Upgrading the VEMs Step 2 Step 3 Verify that the upgrade notification was sent. switch (config)# show vmware vem upgrade status Upgrade Status: Upgrade Availability Notified in vcenter Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the server administrator has accepted the upgrade in vcenter Server. For details about the server administrator accepting the VEM upgrade, see the Accepting the VEM Upgrade in the vcenter Client section on page 28. After the server administrator accepts the upgrade, proceed with the VEM upgrade. switch# show vmware vem upgrade status Upgrade Status: Upgrade Accepted by vcenter Admin Upgrade Notification Sent Time: Sun May 9 22:04: Upgrade Status Time(vCenter): Tue May 11 07:42: Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Step 4 If the ESX host is not hosting the VSM, then proceed to Step 5. If the ESX host is hosting the VSM, coordinate with the server administrator to power off the VSM, upgrade the VEMs on the ESX host using the manual process, and power on the VSM. Step 5 Initiate the Cisco Nexus 1000V Bundle ID upgrade process. If VUM is enabled in the vcenter environment, disable it before entering the vmware vem upgrade proceed command to prevent the new VIBs from being pushed to all the hosts. Enter the vmware vem upgrade proceed command to update the Cisco Nexus 1000V Bundle ID on the vcenter Server. If you do not update the Bundle ID, an incorrect VIB version is pushed to the VEM when you next add an ESX to the VSM. switch# vmware vem upgrade proceed switch# show vmware vem upgrade status 2010 Mar 18 15:37:45 switch %VMS-5-DVS_UPGRADE_INFO: VEM Upgrade is completed successfully in vcenter. Upgrade Status: Upgrade In Progress in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): DVS: VEM BG 24

25 Upgrading the VEMs Step 6 Step 7 Step 8 Step 9 Check for the Upgrade Complete status. switch# show vmware vem upgrade status Upgrade Status: Upgrade Complete in vcenter Upgrade Notification Sent Time: Wed Mar 17 15:19: Upgrade Status Time(vCenter): Wed Mar 17 17:28: Upgrade Start Time: Wed Mar 17 15:20: Upgrade End Time(vCenter): Wed Mar 17 17:28: DVS: VEM BG Coordinate with and wait until the server administrator upgrades all ESX host VEMs with the new VEM software release and informs you that the upgrade process is complete. The server administrator performs the manual upgrade using the vi host update or the ESX/ESXi update. For details, see the Cisco Nexus 1000V VEM Software Installation and Upgrade Guide, Release 4.0(4)SV1(3d). Clear the VEM upgrade status after the upgrade process is complete. switch# vmware vem upgrade complete switch# show vmware vem upgrade status Upgrade Status: Upgrade Notification Sent Time: Upgrade Status Time(vCenter): Upgrade Start Time: Upgrade End Time(vCenter): DVS: VEM BG Verify that the upgrade process is complete. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) (4)SV1(3d) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f

26 Changing the Feature Support Level * this terminal session The line with the bold characters in the preceding example display that all VSMs and VEMs are upgraded to Release 4.0(4)SV1(3d). Step 10 Step 11 Change the feature support level to enable the VSM to support all the new features in the new software version. See the Changing the Feature Support Level section on page 26 for more details. Power on the VMs. Changing the Feature Support Level Since Release 4.0(4)SV1(3d) is a maintenance release, it does not have a Feature Support Level. If you are already at Feature Support Level 4.0(4)SV1(3), you do not have to upgrade the Feature Support Level. This section describes how to change the feature support level and includes the following topics: Prerequisites to Changing the Feature Support Level, page 26 Changing the Feature Support Level, page 26 After all VEMs in the domain are upgraded, the network administrator changes the feature support level to allow the VSM to support all the new features in the new software version. Prerequisites to Changing the Feature Support Level The following are prerequisites to changing the feature support level: Changing the Feature Support Level You are logged in to the CLI in EXEC mode. After an upgrade, the VSM default is to support only features in the previous software version. Features added in the new software version are only supported and functional after the network administrator explicitly upgrades the feature support level. This procedure upgrades the feature support level. You can configure the VSM to provide support for the lowest VEM software version installed to maintain a consistent level of feature support. Before upgrading the feature support level, all VEMs in the VSM domain must be upgraded to the new software version. After the VSM feature support level is upgraded, VEMs with other software versions are not allowed to connect with the VSM. After the VSM feature support level is upgraded, it cannot be downgraded. To change the feature support level, follow these steps: 26

27 Changing the Feature Support Level This procedure is performed by the network administrator. For example purposes, the following procedure reflects an upgrade from Feature Support Level 4.0(4)SV1(2). Step 1 Verify the current level of feature support. switch# show system vem feature level current feature level: 4.0(4)SV1(2) switch# Step 2 If you are currently at Feature Support Level 4.0(4)SV1(1) or 4.0(4)SV1(2), you may elect to update to Feature Support Level 4.0(4)SV1(3). Display output based on the current VEM feature and the version of the VEMs. switch# system update vem feature level 1 4.0(4)SV1(2) 2 4.0(4)SV1(3) If all VEMs are upgraded to the new software version, then the feature support can be upgraded to the new software version. If even a single VEM is running the previous software version, then the feature support level cannot be upgraded, and the list will be empty. Step 3 Change the feature level to the desired index level from the list displayed in Step 2. switch# system update vem feature level 2 Old feature level: 4.0(4)SV1(2) New feature level: 4.0(4)SV1(3) Step 4 Step 5 After the feature level upgrade, VEMs with versions older than the feature level are no longer allowed to connect to the VSM. Verify the updated level of feature support. switch# show system vem feature level current feature level: 4.0(4)SV1(3) switch# Verify connectivity to the VEMs. switch# show mod Mod Ports Module-Type Model Status Virtual Supervisor Module Nexus1000V ha-standby 2 0 Virtual Supervisor Module Nexus1000V active * Virtual Ethernet Module NA ok Virtual Ethernet Module NA ok Mod Sw Hw (4)SV1(3d) (4)SV1(3d) (4)SV1(3d)

28 Accepting the VEM Upgrade in the vcenter Client 4 4.0(4)SV1(3d) 1.11 Mod MAC-Address(es) Serial-Num c-5a-a8 to c-62-a8 NA c-5a-a8 to c-62-a8 NA c to c NA c to c NA Mod Server-IP Server-UUID Server-Name NA NA NA NA ee15784-f2e8-383e ca1bb c4c e-804d-cac04f * this terminal session Step 6 The output of the show module command can show either of the following VEM states: OK The VEM has connectivity to the VSM. not-inserted(upgrade) The VEM is not connected to the VSM. Your software upgrade is complete. Accepting the VEM Upgrade in the vcenter Client This section describes the steps that a server administrator follows to accept a VEM upgrade in the vcenter Client and includes the following topics: Prerequisites to Accepting the VEM Upgrade section on page 28 Accepting the VEM Upgrade section on page 28 For details about how to upgrade the VEMs see Upgrading the VEMs section on page 14. Prerequisites to Accepting the VEM Upgrade The following are prerequisites to accepting a VEM upgrade: You are logged in to the CLI in EXEC mode. Network and server administrators are coordinating the upgrade procedure. The VSM upgrade has occurred before the VEM upgrade. You have received a notification in vcenter that a VEM software upgrade is available. Accepting the VEM Upgrade The server administrator accepts the VEM upgrade after the network administrator has upgraded the VSM and notified vcenter server of the availability of the new VEM software version. To accept a request for a VEM upgrade, follow these steps: 28

29 Troubleshooting This procedure is performed by the server administrator. Step 1 Click the vsphere Client DVS Summary tab to check for the availability of a software upgrade (see Figure 1). Figure 1 vsphere Client DVS Summary Tab Step 2 Click Apply upgrade. The following actions occur: The network administrator is notified that you are ready to apply the upgrade to the VEMs. The network administrator notifies vcenter to proceed with the VEM upgrades. If you are using VUM, vcenter locks the DVS and triggers VUM to upgrade the VEMs. For details about the VEM upgrade performed by the network administrator, see the Upgrading the VEMs section on page 14. Troubleshooting This section provides troubleshooting guidelines for problems that may occur during an upgrade. This section includes the following topic: Non-default (Jumbo) MTU Settings Symptoms and Solutions, page 30 29

Cisco Nexus 1000V Software Upgrade Guide, Release 4.2(1)SV1(4a)

Cisco Nexus 1000V Software Upgrade Guide, Release 4.2(1)SV1(4a) Cisco Nexus 1000V Software Upgrade Guide, Release 4.2(1)SV1(4a) Revised: May 9, 2012 Caution The upgrade procedure for Release 4.2(1)SV1(4a) has changed. We highly recommend that you read this document

More information

Upgrading the Cisco VSG and the Cisco Prime NSC

Upgrading the Cisco VSG and the Cisco Prime NSC Upgrading the Cisco VSG and the Cisco Prime NSC This chapter contains the following sections: Complete Upgrade Procedure, page 1 Upgrade Guidelines and Limitations, page 2 VSG Environment Upgrade Matrix

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4)

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) First Published: April 17, 2015 Last Modified: August 27, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Send document comments to

Send document comments to CHAPTER 3 This chapter describes how to identify and resolve installation problems, and includes the following topics: Isolating Problems, page 3-1 Improving Performance, page 3-4 Verifying the Domain

More information

Upgrading or Downgrading the Cisco Nexus 3500 Series NX-OS Software

Upgrading or Downgrading the Cisco Nexus 3500 Series NX-OS Software Upgrading or Downgrading the Cisco Nexus 3500 Series NX-OS Software This chapter describes how to upgrade or downgrade the Cisco NX-OS software. It contains the following sections: About the Software Image,

More information

Configuring Virtual Service Blades

Configuring Virtual Service Blades CHAPTER 4 This chapter describes how to create and configure virtual service blades and includes the following sections: Information About Virtual Service Blades, page 4-1 Guidelines and Limitations, page

More information

This table describes the supervisor module options for switches in the Cisco MDS 9000 Family.

This table describes the supervisor module options for switches in the Cisco MDS 9000 Family. This chapter describes how to manage switching and services modules (also known as line cards) and provides information on monitoring module states. About Modules, page 1 Maintaining Supervisor Modules,

More information

Performing Software Maintenance Upgrades (SMUs)

Performing Software Maintenance Upgrades (SMUs) Performing Software Maintenance Upgrades (SMUs) This chapter describes how to perform software maintenance upgrades (SMUs) on Cisco Nexus 3000 Series switches. This chapter includes the following sections:

More information

Performing Software Maintenance Upgrades

Performing Software Maintenance Upgrades This chapter describes how to perform software maintenance upgrades (SMUs) on Cisco NX-OS devices. This chapter includes the following sections: About SMUs, page 1 Prerequisites for SMUs, page 3 Guidelines

More information

Installing and Configuring Licenses

Installing and Configuring Licenses This chapter contains the following sections: Information About Installing and Upgrading s, page 1 Licensing Guidelines and Limitations, page 2 Default Configuration Settings, page 3 Obtaining and Installing

More information

Exporting and Importing a Virtual Service Blade

Exporting and Importing a Virtual Service Blade This chapter contains the following sections: Information About, page 1 Guidelines and Limitations for, page 1 Exporting a Virtual Service Blade, page 2 Importing a Virtual Service Blade, page 5 Verifying

More information

Configuring the Software Using the GUI

Configuring the Software Using the GUI CHAPTER 3 This chapter describes how to use the GUI application to complete the Cisco Nexus 1000V configuration, and includes the following sections. GUI Software Configuration Process, page 3-2 Guidelines

More information

Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference

Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference July 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a)

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) October 18, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Managing Modules. About Modules. Send documentation comments to CHAPTER

Managing Modules. About Modules. Send documentation comments to CHAPTER CHAPTER 19 This chapter describes how to manage switching and services modules (also known as line cards) and provides information on monitoring module states. This chapter includes the following sections:

More information

Cisco Nexus 1000V License Configuration Guide, Release 4.2(1)SV2(1.1)

Cisco Nexus 1000V License Configuration Guide, Release 4.2(1)SV2(1.1) Cisco Nexus 1000V License Configuration Guide, Release 4.2(1)SV2(1.1) First Published: December 04, 2012 Last Modified: February 20, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Configuring System Port Profiles

Configuring System Port Profiles 4 CHAPTER This chapter describes system port profiles and how to configure them. This chapter includes the following sections: Information About System Port Profiles, page 4-1 Guidelines and Limitations

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

Cisco cbr Converged Broadband Routers High Availability Configuration Guide

Cisco cbr Converged Broadband Routers High Availability Configuration Guide Cisco cbr Converged Broadband Routers High Availability Configuration Guide First Published: 2015-07-31 Last Modified: 2015-12-01 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Installing the Cisco Nexus 1000V Software Using ISO or OVA Files

Installing the Cisco Nexus 1000V Software Using ISO or OVA Files Installing the Cisco Nexus 1000V Software Using ISO or OVA Files This chapter contains the following sections: Installing the VSM Software, page 1 Installing the VSM Software Installing the Software from

More information

Working with Configuration Files

Working with Configuration Files This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration

More information

Virtual Services Container

Virtual Services Container , page 1 Prerequisites for a You must have a Cisco device installed with an operating system release that supports virtual services and has the needed system infrastructure required for specific applications

More information

Installing and Upgrading VMware

Installing and Upgrading VMware This chapter contains the following sections: Upgrading from VMware Releases 5.x to VMware Release 6.0, page 1 Installing VMware Release 5.x and 6.x Patches, page 9 Verifying the Build Number and Upgrade,

More information

Migrating Hosts to the Cisco Nexus 1000V Using Cisco Virtual Switch Update Manager, page 3

Migrating Hosts to the Cisco Nexus 1000V Using Cisco Virtual Switch Update Manager, page 3 Migrating Hosts to Cisco Nexus 1000V Using Cisco Virtual Switch Update Manager This chapter contains the following sections: Information About Migrating Hosts to the Cisco Nexus 1000V Switch Using Cisco

More information

Cisco Prime Network Analysis Module (Cisco Prime NAM) for Nexus 1110 Installation and Configuration Guide

Cisco Prime Network Analysis Module (Cisco Prime NAM) for Nexus 1110 Installation and Configuration Guide Cisco Prime Network Analysis Module (Cisco Prime NAM) for Nexus 1110 Installation and Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

VDC Virtual Device Context. Prepared By Rajeev Srikant

VDC Virtual Device Context. Prepared By Rajeev Srikant VDC Virtual Device Context Prepared By Rajeev Srikant Agenda What is VDC? Why Use VDCs? Creating & Configuring VDCs 2 What is VDC? Virtual Device Contexts (VDCs): Cisco s VDC are basically Virtual Ethernet

More information

Cisco Nexus 3500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.x

Cisco Nexus 3500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.x Cisco Nexus 3500 Series NX-OS Software Upgrade and Downgrade Guide, Release 7.x First Published: 2018-02-01 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Cisco Nexus 1100 Series Virtual Services Appliances

Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Version 1.0 June 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

Configuring Supervisor Engine Redundancy on the Catalyst 4507R and 4510R Switches

Configuring Supervisor Engine Redundancy on the Catalyst 4507R and 4510R Switches 36 CHAPTER Configuring Supervisor Engine Redundancy on the Catalyst 4507R and 4510R Switches This chapter describes how to configure supervisor engine redundancy on the Catalyst 4507R and Catalyst 4510R

More information

Cisco Mini ACI Fabric and Virtual APICs

Cisco Mini ACI Fabric and Virtual APICs Cisco Mini ACI Fabric and Virtual APICs New and Changed 2 Cisco Mini ACI Fabric and Virtual APICs Overview 2 Installing and Configuring Physical APIC 3 Installing and Configuring Virtual APIC 3 Upgrading

More information

Configuring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections:

Configuring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections: This chapter contains the following sections: Information About VM-FEX, page 1 Licensing Requirements for VM-FEX, page 3 Default Settings for VM-FEX, page 3, page 4 Verifying the VM-FEX Configuration,

More information

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER CHAPTER 10 This chapter describes how to install and upgrade software images, and introduces the file system. It includes the following sections: About, page 10-1 Essential Upgrade Prerequisites, page

More information

NSX-T Upgrade Guide. VMware NSX-T 2.0

NSX-T Upgrade Guide. VMware NSX-T 2.0 VMware NSX-T 2.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to docfeedback@vmware.com

More information

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Troubleshooting Licensing Issues

Troubleshooting Licensing Issues 4 CHAPTER This chapter describes how to troubleshoot issues that are related to firewall licensing on the Virtual Supervisor Module (VSM). This chapter includes the following sections: Information About

More information

Cisco UCS Manager Firmware Management Using the CLI, Release 3.1

Cisco UCS Manager Firmware Management Using the CLI, Release 3.1 First Published: 2016-01-20 Last Modified: 2017-04-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Managing ACE Software Licenses

Managing ACE Software Licenses CHAPTER 4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to manage the software licenses for your ACE. It contains

More information

Cisco UCS Manager VM-FEX for VMware GUI Configuration Guide

Cisco UCS Manager VM-FEX for VMware GUI Configuration Guide First Published: September 06, 2011 Last Modified: April 23, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Installing Cisco AVS Using the ESXi CLI or VMware VUM

Installing Cisco AVS Using the ESXi CLI or VMware VUM Installing Cisco AVS Using the ESXi CLI or VMware VUM This appendix contains instructions for installing the Cisco Application Virtual Switch (AVS) with the ESXi CLI or VMware Virtual Update Manager (VUM).

More information

Send document comments to Information About Layer 2 Ethernet Switching

Send document comments to Information About Layer 2 Ethernet Switching CHAPTER 8 This chapter describes how to identify and resolve problems that relate to Layer 2 switching. This chapter includes the following sections: Information About Layer 2 Ethernet Switching, page

More information

Converting from Cisco NX-OS to ACI Boot Mode

Converting from Cisco NX-OS to ACI Boot Mode This chapter describes how to convert a Cisco Nexus 9000 Series switch from Cisco NX-OS to Cisco Application Centric Infrastructure (ACI) boot mode. It contains the following sections: Converting to ACI

More information

Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 09, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections: This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,

More information

Performing Software Maintenance Upgrades

Performing Software Maintenance Upgrades This chapter contains the following sections:, on page 1 Prerequisites for SMUs A software maintenance upgrade (SMU) is a package file that contains fixes for specific defects. SMUs are created to respond

More information

VersaStack for Data Center Design & Implementation (VDCDI) 1.0

VersaStack for Data Center Design & Implementation (VDCDI) 1.0 VersaStack for Data Center Design & Implementation (VDCDI) 1.0 COURSE OVERVIEW: VersaStack for Data Center Design and Implementation (VDCDI) is a four-day training program. The Cisco-IBM VersaStack validated

More information

Managing Switch Stacks

Managing Switch Stacks Finding Feature Information, page 1 Prerequisites for Switch Stacks, page 1 Restrictions for Switch Stacks, page 2 Information About Switch Stacks, page 2 How to Configure a Switch Stack, page 14 Troubleshooting

More information

Configuring Session Manager

Configuring Session Manager This chapter describes how to configure Session Manager on Cisco NX-OS devices. This chapter contains the following sections: About Session Manager, page 1 Licensing Requirements for Session Manager, page

More information

Configuring RPR Supervisor Engine Redundancy

Configuring RPR Supervisor Engine Redundancy CHAPTER 7 This chapter describes how to configure supervisor engine redundancy using route processor redundancy (RPR). For complete syntax and usage information for the commands used in this chapter, see

More information

Configuring Virtual Ethernet Interfaces

Configuring Virtual Ethernet Interfaces CHAPTER 4 This chapter describes how to configure virtual Ethernet (vethernet or veth) interfaces. This chapter includes the following sections: Information About vethernet Interfaces, page 4-1 Guidelines

More information

Send document comments to

Send document comments to CHAPTER 8 This chapter describes how to configure Telnet and includes the following topics: Information About the Telnet Server, page 8-1 Prerequisites for Telnet, page 8-1 Guidelines and Limitations,

More information

Cisco UCS Manager Firmware Management Guide, Release 3.2

Cisco UCS Manager Firmware Management Guide, Release 3.2 First Published: 2017-08-18 Last Modified: 2017-10-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Cisco Nexus 9000 Series Switches Conversion from Cisco NX-OS to Cisco ACI-Mode

Cisco Nexus 9000 Series Switches Conversion from Cisco NX-OS to Cisco ACI-Mode Cisco Nexus 9000 Series Switches Conversion from Cisco NX-OS to Cisco ACI-Mode New and Changed Information 2 Overview 2 ACI Image Management 2 EPLD Verification and Upgrade Process 3 Booting to a New ACI

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine ISE Features Not Supported in a Virtual Machine, page 1 Supported VMware Versions, page 1 Support for VMware vmotion, page 2 Support for Open Virtualization Format, page 2 Virtual Machine Requirements,

More information

Software Package Management Commands

Software Package Management Commands Software Package Management Commands This chapter describes the Cisco IOS XR commands used to add packages to a router storage device, activate or deactivate packages, upgrade or downgrade existing packages,

More information

Configuring EEE. Finding Feature Information. This chapter describes how to configure Energy Efficient Ethernet (EEE) on Cisco NX-OS devices.

Configuring EEE. Finding Feature Information. This chapter describes how to configure Energy Efficient Ethernet (EEE) on Cisco NX-OS devices. This chapter describes how to configure Energy Efficient Ethernet (EEE) on Cisco NX-OS devices. Finding Feature Information, page 1 Information About EEE, page 2 Virtualization Support, page 2 Licensing

More information

Cisco UCS Manager Firmware Management Guide, Release 3.1

Cisco UCS Manager Firmware Management Guide, Release 3.1 First Published: 2016-01-20 Last Modified: 2017-04-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Configuring Online Diagnostics

Configuring Online Diagnostics CHAPTER 12 This chapter describes how to configure the generic online diagnostics (GOLD) feature on Cisco NX-OS devices. This chapter includes the following sections: Information About Online Diagnostics,

More information

Configuring RPR and RPR+ Supervisor Engine Redundancy

Configuring RPR and RPR+ Supervisor Engine Redundancy CHAPTER 8 Configuring RPR and RPR+ Supervisor Engine Redundancy This chapter describes how to configure supervisor engine redundancy using route processor redundancy (RPR) and RPR+. For complete syntax

More information

Release notes for Flash Recovery Tool Version 10.0(2)

Release notes for Flash Recovery Tool Version 10.0(2) Release notes for Flash Recovery Tool Version 10.0(2) Problem Description After several months or years in continuous operation, underlying boot flash devices on NEXUS 7000 SUP2/2E supervisor boards may

More information

Configuring RPR Supervisor Engine Redundancy

Configuring RPR Supervisor Engine Redundancy 6 CHAPTER This chapter describes how to configure supervisor engine redundancy using route processor redundancy (RPR). For complete syntax and usage information for the commands used in this chapter, see

More information

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2)

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2) Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2) First Published: January 30, 2014 Last Modified: October 20, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

No Service Password-Recovery

No Service Password-Recovery No Service Password-Recovery Last Updated: January 18, 2012 The No Service Password-Recovery feature is a security enhancement that prevents anyone with console access from accessing the router configuration

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Converting to Cisco Nexus 1000V Distributed Switches for Cisco HyperFlex Virtual Machine Guest and VMware vmotion Networks Author: Hui Chen October 2016 2016 Cisco and/or

More information

Installing and Configuring VXLAN Gateway

Installing and Configuring VXLAN Gateway Installing and Configuring VXLAN Gateway This chapter contains the following sections: Information About the VXLAN Gateway Deployment, page 1 Guidelines and Limitations, page 2 Configuring VSMs, page 3

More information

About Updating a System, page 1 Connecting to an ISO Image from the CD/DVD Drive, page 4 Updating Data Centers, page 4

About Updating a System, page 1 Connecting to an ISO Image from the CD/DVD Drive, page 4 Updating Data Centers, page 4 About Updating a System, page 1 Connecting to an ISO Image from the CD/DVD Drive, page 4 Updating Data Centers, page 4 About Updating a System In a Single-data Center (SDC) system, the data center must

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine ISE Features Not Supported in a Virtual Machine, page 1 Supported VMware Versions, page 1 Support for VMware vmotion, page 2 Support for Open Virtualization Format, page 2 Virtual Machine Requirements,

More information

Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x

Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x Cisco Nexus 9000 Series NX-OS Virtual Machine Tracker Configuration Guide, Release 9.x First Published: 2018-07-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Overview. Overview. This chapter includes the following sections:

Overview. Overview. This chapter includes the following sections: This chapter includes the following sections:, page 1 Components That Support Firmware Upgrade, page 6 Firmware Version Terminology, page 7 Cross-Version Firmware Support, page 8 Server Pack, page 10 Light

More information

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 7.0(3)F1(1)

Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 7.0(3)F1(1) Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 7.0(3)F1(1) This document lists the current and past versions of EPLD images and describes how to update them for use with the Cisco Nexus

More information

Installing Cisco Virtual Switch Update Manager

Installing Cisco Virtual Switch Update Manager This chapter contains the following sections: Information About Cisco Virtual Switch Update Manager, page 1 Compatibility Information for Cisco VSUM, page 1 System Requirements Cisco VSUM, page 2 Prerequisites,

More information

Installing and Administering VMware vsphere Update Manager. Update 2 VMware vsphere 5.5 vsphere Update Manager 5.5

Installing and Administering VMware vsphere Update Manager. Update 2 VMware vsphere 5.5 vsphere Update Manager 5.5 Installing and Administering VMware vsphere Update Manager Update 2 VMware vsphere 5.5 vsphere Update Manager 5.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

NSX-T Upgrade Guide. VMware NSX-T 2.1

NSX-T Upgrade Guide. VMware NSX-T 2.1 VMware NSX-T 2.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to docfeedback@vmware.com

More information

UCS with VMware ESXi End to End Jumbo MTU Configuration Example

UCS with VMware ESXi End to End Jumbo MTU Configuration Example UCS with VMware ESXi End to End Jumbo MTU Configuration Example Document ID: 117601 Contributed by Vishal Mehta, Cisco TAC Engineer. Apr 09, 2014 Contents Introduction Prerequisites Requirements Components

More information

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-999 EXAM QUESTIONS & ANSWERS Number: 642-999 Passing Score: 800 Time Limit: 90 min File Version: 32.5 http://www.gratisexam.com/ Sections 1. Questions 2. Drag & Drop 3. Hot Spot CISCO 642-999

More information

Configuring ECMP for Host Routes

Configuring ECMP for Host Routes CHAPTER 9 This chapter describes how to configure the equal-cost multipathing (ECMP) protocol for host routes on the Cisco NX-OS switch. This chapter includes the following sections: Information About

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 642-995 Exam Questions & Answers Number: 642-995 Passing Score: 800 Time Limit: 120 min File Version: 36.9 http://www.gratisexam.com/ Exam Code: 642-995 Exam Name: Unified Computing Troubleshoot

More information

Initial Configuration

Initial Configuration CHAPTER 2 This chapter provides Cisco NX-OS best practices that are that typically configured when a Cisco Nexus 7000 Series switch is powered up for the first time and the user is connected to the RS-232

More information

Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x

Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x First Published: August 12, 2014 Last Modified: November 10, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Post-Installation and Maintenance Tasks

Post-Installation and Maintenance Tasks Log In to the Cisco ISE Web-Based Interface, on page 1 Cisco ISE Configuration Verification, on page 2 VMware Tools Installation Verification, on page 4 Return Material Authorization, on page 6 Reset a

More information

Configuring Online Diagnostics

Configuring Online Diagnostics This chapter describes how to configure the generic online diagnostics feature on Cisco NX-OS devices. This chapter contains the following sections: Finding Feature Information, page 1 Information About

More information

VMware vsphere with ESX 6 and vcenter 6

VMware vsphere with ESX 6 and vcenter 6 VMware vsphere with ESX 6 and vcenter 6 Course VM-06 5 Days Instructor-led, Hands-on Course Description This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere

More information

Configuring a MAC ACL

Configuring a MAC ACL 10 CHAPTER This chapter describes how to configure MAC access lists (ACLs) on NX-OS devices. This chapter includes the following sections: Information About MAC ACLs, page 10-1 Prerequisites for MAC ACLs,

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-999 EXAM QUESTIONS & ANSWERS Number: 642-999 Passing Score: 800 Time Limit: 90 min File Version: 32.5 http://www.gratisexam.com/ Sections 1. Questions 2. Drag & Drop 3. Hot Spot CISCO 642-999

More information

Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide

Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide Cisco MDS 9000 Family NX-OS High Availability and Redundancy Configuration Guide July 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Configuring WCCPv2. Information About WCCPv2. Send document comments to CHAPTER

Configuring WCCPv2. Information About WCCPv2. Send document comments to CHAPTER CHAPTER 5 This chapter describes how to configure the Web Cache Communication Protocol version 2 (WCCPv2) on Cisco NX-OS devices. This chapter includes the following sections: Information About WCCPv2,

More information

Cisco Virtual Security Gateway Deployment Guide VSG 1.4

Cisco Virtual Security Gateway Deployment Guide VSG 1.4 Deployment Guide Cisco Virtual Security Gateway Deployment Guide VSG 1.4 Deployment Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 33

More information

Overview. Overview. Cisco UCS 6324 Fabric Interconnect with Cisco UCS B-Series Servers and C-Series Servers, which is. Overview 1

Overview. Overview. Cisco UCS 6324 Fabric Interconnect with Cisco UCS B-Series Servers and C-Series Servers, which is. Overview 1 This chapter includes the following sections:, on page 1 Components That Support Firmware Upgrade, on page 6 Firmware Version Terminology, on page 7 Cross-Version Firmware Support, on page 8 Server Pack,

More information

vsphere Update Manager Installation and Administration Guide 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

vsphere Update Manager Installation and Administration Guide 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 vsphere Update Manager Installation and Administration Guide 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at:

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 2 Virtual Machine Resource and Performance Checks,

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

ESXi Version 5.1 Host

ESXi Version 5.1 Host ESXi Version 5.1 Host Rapid EqualLogic Configuration Series Implementation guide December 2012 SISfeedback@Dell.com Revisions Date April 2012 Status Initial release Sept. 2012 Updates for ESXi 5.1 and

More information

B Commands. bandwidth (interface) Send document comments to

B Commands. bandwidth (interface) Send document comments to This chapter describes the Cisco Nexus 1000V commands that begin with the letter, B. bandwidth (interface) To set the inherited and received bandwidth for an interface, use the bandwidth command. To restore

More information

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

Configuring IPv4. Finding Feature Information. This chapter contains the following sections: This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites

More information

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(5.1)

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(5.1) Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV1(5.1) January 14, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information