Cisco Nexus 7000 Series NX-OS CLI Management Best Practices Guide



Similar documents
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco IOS Flexible NetFlow Command Reference

Cisco TelePresence VCR MSE 8220

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

Virtual Fragmentation Reassembly

Cisco Unified Communications Manager SIP Line Messaging Guide (Standard)

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8

Cisco Nexus 7000 Series NX-OS System Management Configuration Guide

Configuring SSH and Telnet

Firewall Authentication Proxy for FTP and Telnet Sessions

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Sample Configuration: Cisco UCS, LDAP and Active Directory

Managing Storage Services Modules

Cisco Collaboration with Microsoft Interoperability

Troubleshooting Procedures for Cisco TelePresence Video Communication Server

Cisco Nexus 1000V Virtual Ethernet Module Software Installation Guide, Release 4.0(4)SV1(1)

Cisco Cius Development Guide Version 1.0 September 30, 2010

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D December 2013

Cisco WebEx Meetings Server System Requirements

Skills Assessment Student Training Exam

Cisco Nexus 5548UP. Switch Configuration Guide for Dell PS Series SANs. A Dell Deployment and Configuration Guide

FireSIGHT User Agent Configuration Guide

Command Line Interface User s Guide

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0

Cisco NX-OS Licensing Guide

Troubleshooting the Firewall Services Module

Replacing MCU Software with TelePresence Server Software on Cisco TelePresence MCU 5300 Series. Last Updated: February 2016

Geschreven door Administrator woensdag 13 februari :37 - Laatst aangepast woensdag 13 februari :05

Firewall Stateful Inspection of ICMP

Command Line Interface User s Guide

Lab Configuring Syslog and NTP (Instructor Version)

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Cisco TelePresence VCR Converter 1.0(1.8)

Troubleshooting the Firewall Services Module

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Enabling Remote Access to the ACE

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

Chapter 4 Rate Limiting

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Session Initiation Protocol Gateway Call Flows and Compliance Information

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1)

Getting Started Guide for Cisco UCS E-Series Servers, Release 2.x

Controlling Access to a Virtual Terminal Line

Configuring System Message Logging

Basic Configuration of the Cisco Series Internet Router

Configuring the Firewall Management Interface

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

File Transfers. Contents

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

7750 SR OS System Management Guide

management and configuration guide hp procurve series 2500 switches

Transferring Files Using HTTP or HTTPS

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version Rev. B

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

Implementing Cisco Data Center Unified Fabric Course DCUFI v5.0; 5 Days, Instructor-led

Cisco TelePresence Management Suite 15.0

Configuring Static and Dynamic NAT Translation

HP Load Balancing Module

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Licensing Cisco NX-OS Software Features

Configuring Auto Policy-Based Routing

Lab Configure Basic AP Security through IOS CLI

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Cisco Jabber for Windows 10.5 Advanced Features Guide

Configuring Network Address Translation

Lab Configure Syslog on AP

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring NTP. Information About NTP. NTP Overview. Send document comments to CHAPTER

8 steps to protect your Cisco router

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

How To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router

HP A-IMC Firewall Manager

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Router Recovery with ROM Monitor

Cisco TelePresence Management Suite Provisioning

Configuring the Cisco IOS In-Service Software Upgrade Process

Cisco Unified Workforce Optimization

Securing Networks with PIX and ASA

Cisco Nexus 7000 Series Supervisor Module

NX-OS and Cisco Nexus Switching

Release Notes for Cisco C881G-U-K9

- The PIX OS Command-Line Interface -

ICND IOS CLI Study Guide (CCENT)

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Firewall Support for SIP

Configuring Denial of Service Protection

- Basic Router Security -

Configuring Password Encryption

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Applicazioni Telematiche

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager and IM & Presence Service, Release 9.1(1)

SNMP Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted 8.0(1)

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Cisco Unified CDR Analysis and Reporting Administration Guide, Release 10.0(1)

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3

Transcription:

Cisco Nexus 7000 Series NX-OS CLI Management Best Practices Guide First Published: February 2011 Last Modified: August 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB s public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. 2011 Cisco Systems, Inc. All rights reserved.

CONTENTS Preface vii CHAPTER 1 Overview 1-1 CHAPTER 2 Initial Configuration 2-1 Setup Utility (First Time Setup) 2-1 Global Configuration Parameters 2-2 Terminal CLI Access (SSHv2) 2-2 Hostname 2-3 Boot Variables 2-3 MOTD Login Banner 2-3 Password Strength-Check 2-4 Power Budget 2-4 Power Redundancy Mode 2-5 Powering Off Unused I/O and Fabric Modules 2-5 Cisco NX-OS Licensing 2-5 Installation Process 2-6 Verifying the License Status 2-6 Backing Up a License File 2-7 CHAPTER 3 Connecting to the Management Network and Securing Access 3-1 Out-of-Band Management Connectivity 3-1 Console Port Configuration 3-3 Exec-Timeout 3-3 Port Speed 3-3 VTY Port Configuration 3-3 Exec-Timeout 3-3 Session Limit 3-3 Access-List 3-4 Supervisor Management Port Configuration 3-4 Access List 3-4 Access-List Logging 3-5 Supervisor CMP Port Configuration 3-5 Access List 3-5 iii

Contents CHAPTER 4 Protecting the CPU 4-1 CoPP Policy 4-1 Denying In-Band Management Protocols 4-1 Syslog Message Thresholds 4-2 CPU Rate Limit Logging 4-2 CHAPTER 5 Integrated Intrusion Detection Security 5-1 Verifying IDS Check Status and Counters 5-1 Disabling/Enabling IDS Packet Checks 5-2 CHAPTER 6 Cisco NX-OS Software Upgrade or Downgrade 6-1 Recommended Upgrade Procedure (ISSU) 6-1 Verifying Software Compatibility (ISSU and Chassis Reload) 6-2 Traditional Upgrade or Downgrade Procedure (Chassis Reload) 6-2 CHAPTER 7 EPLD Software Upgrade or Downgrade 7-1 EPLD Upgrade/Downgrade Verification 7-1 EPLD Upgrade Procedure 7-2 CHAPTER 8 Enabling and Disabling Features 8-1 CHAPTER 9 IP Management 9-1 Network Time Protocol (NTP) 9-1 Redundant NTP Servers 9-1 Time zone / Daylight Savings 9-1 NTP Source Interface / IP Address 9-2 NTP Logging 9-2 MD5 Authentication 9-2 Access Control List 9-2 Simple Network Management Protocol (SNMP) 9-3 Basic Configuration (Contact/Location) 9-3 Users (Version 3) 9-3 Community Strings (Version 1 and 2c) 9-3 Notification / Trap Receivers 9-4 Notification / Trap Events 9-4 Interface Link-Status Traps 9-5 Community String Access Control List 9-5 Source Interface 9-5 iv

Contents Disabling SNMP 9-5 System Message Logging 9-6 Syslog Server 9-6 Source Interface 9-6 Link Status Events 9-6 Timestamps 9-7 Per Feature Severity Level 9-7 Viewing Log File Contents 9-7 Clearing Log File Contents 9-7 Smart Call Home 9-8 Internal and Cisco TAC Recipients (Destination-Profiles) 9-8 Testing Call Home Recipients 9-9 CHAPTER 10 Management Tools for Usability 10-1 Implementing Configuration Changes 10-1 Configuration Rollback 10-1 Session Manager 10-2 Supervisor Redundancy 10-2 Verifying Supervisor Status 10-3 Manual Switchover 10-3 Locator LED 10-3 Ethanalyzer 10-4 Switched Port Analyzer 10-5 Performing a Debug 10-6 Redirecting Output to a File 10-6 CHAPTER 11 Verifying Hardware Diagnostics and Logging 11-1 Online Diagnostics 11-1 Enabling GOLD 11-1 Understanding Diagnostic Contents (Per Module) 11-1 On-Demand Tests 11-2 Verifying GOLD Test Results (Per Module) 11-2 Onboard Failure-Logging 11-3 Enabling/Disabling OBFL 11-3 Viewing Log Contents 11-3 Clearing Log Contents 11-3 v

Contents CHAPTER 12 Managing Hardware Resource Utilization 12-1 CPU Processes 12-1 Utilization 12-1 Restarting a Process 12-2 Memory 12-2 DRAM Utilization 12-2 Flash Utilization 12-3 MAC Address TCAM Tables 12-3 Utilization 12-3 Aging Time 12-4 Unicast or Multicast TCAM Tables 12-4 Utilization 12-4 NetFow TCAM Tables 12-5 Utilization 12-5 ACL or QoS TCAM Tables 12-5 Utilization 12-5 ACL Resource Polling 12-6 Fabric Utilization 12-6 VDC Resource Utilization 12-7 CHAPTER 13 Collecting Data for the Cisco TAC 13-1 Collecting Show Tech-Support Information 13-1 Generating a TAC-PAC 13-2 Archiving or Compressing Multiple Files 13-2 Verifying and Collecting Core Files 13-2 vi

Preface This preface describes the audience, organization, and conventions of the Cisco Nexus 7000 Series CLI Management Best Practices Guide. It also provides information on how to obtain related documentation. This chapter includes the following sections: Audience, page vii Document Organization, page vii Document Conventions, page viii Related Documentation, page ix Obtaining Documentation and Submitting a Service Request, page x Audience This publication is for experienced network administrators who configure and maintain Cisco NX-OS devices. Document Organization This document is organized into the following chapters: Chapter Chapter 1, Overview Chapter 2, Initial Configuration Chapter 3, Connecting to the Management Network and Securing Access Chapter 4, Protecting the CPU Description Describes the purpose of this guide. Describes the Cisco NX-OS best practices that are typically configured when a Cisco Nexus 7000 Series switch is powered up for the first time. Describes the Cisco NX-OS recommended best practices for connecting a Cisco Nexus 7000 Series switch to the management network(s) and securing access to the CLI. Describes the recommended best practices for protecting the CPU against Denial of Service (DoS) attacks. vii

Preface Chapter Chapter 5, Integrated Intrusion Detection Security Chapter 6, Cisco NX-OS Software Upgrade or Downgrade Chapter 7, EPLD Software Upgrade or Downgrade Chapter 8, Enabling and Disabling Features Chapter 9, IP Management Chapter 10, Management Tools for Usability Chapter 11, Verifying Hardware Diagnostics and Logging Chapter 12,Managing Hardware Resource Utilization Chapter 13, Collecting Data for the Cisco TAC Description Describes two types of Intrusion Detection System packet checks that are enabled in Cisco NX-OS software. Describes the Cisco NX-OS best practices for upgrading or downgrading Cisco NX-OS system software. Describes the recommended procedure for upgrading or downgrading an electronic programmable logic device (EPLD). Describes the process for enabling and disabling software features. Describes the Cisco NX-OS best practices that are recommended when configuring IP management protocols. Describes Cisco NX-OS features that are recommended for managing a device. Describes the Cisco NX-OS recommended features and procedures for managing and troubleshooting potential hardware faults. Describes Cisco NX-OS procedures that are recommended for managing hardware resources such as the CPU, memory, and I/O module TCAM table utilization. Describes the recommended procedures for collecting troubleshooting information that should be attached to a TAC case. Document Conventions Command descriptions use these conventions: Convention Description boldface font Commands and keywords are in boldface. italic font Arguments for which you supply values are in italics. { } Elements in curly brackets are required. [ ] Elements in square brackets are optional. [ x y z ] Optional alternative keywords are grouped in brackets and separated by vertical bars. string A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. viii

Preface Screen examples use these conventions: screen font boldface screen font Terminal sessions and information that the switch displays are in screen font. Information that you must enter is in boldface screen font. italic screen font Arguments for which you supply values are in italic screen font. < > Nonprinting characters, such as passwords, are in angle brackets. [ ] Default responses to system prompts are in square brackets.!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. This document uses the following conventions: Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual. Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Related Documentation Cisco NX-OS includes the following documents: Release Notes Cisco Nexus 7000 Series NX-OS Release Notes, Release 4.1 NX-OS Configuration Guides Cisco Nexus 7000 Series NX-OS Getting Started with Virtual Device Contexts, Release 4.1 Cisco Nexus 7000 Series OTV Quick Start Guide Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Quality of Service Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Multicast Routing Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS MPLS Configuration Guide, Release 5.x Cisco Nexus 7000 Series NX-OS Security Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS OTV Configuration Guide ix

Preface Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS FabricPath Configuration Guide Cisco Nexus 7000 Series NX-OS Software Upgrade and Downgrade Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS Licensing Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide, Release 4.1 Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 4.1 Cisco NX-OS FCoE Configuration Guide Configuring the Cisco Nexus 2000 Series Fabric Extender Cisco Nexus 7000 Series NX-OS XML Management Interface User Guide, Release 4.1 Cisco MDS 9000 Family and Nexus 7000 Series NX-OS System Messages Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS MIB Quick Reference NX-OS Command References Cisco Nexus 7000 Series NX-OS Command Reference Master Index, Release 4.1 Cisco Nexus 7000 Series NX-OS Fundamentals Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS Interfaces Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS Layer 2 Switching Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS Quality of Service Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS Unicast Routing Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS Multicast Routing Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS MPLS Command Reference Cisco Nexus 7000 Series NX-OS Security Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS OTV Command Reference Cisco Nexus 7000 Series NX-OS Virtual Device Context Command Reference, Release 4.1 Cisco Nexus 7000 Series NX-OS FabricPath Command Reference Cisco Nexus 7000 Series NX-OS System Management Command Reference, Release 4.1 Cisco NX-OS FCoE Command Reference Other Software Document Cisco Nexus 7000 Series NX-OS Troubleshooting Guide, Release 4.x Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/us/docs/general/whatsnew/whatsnew.html x

Preface Subscribe to the What s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0. xi

Preface xii

CHAPTER 1 Overview This document provides a quick reference of recommended best practices for managing a Cisco Nexus 7000 Series switch using the Cisco NX-OS command-line interface (CLI). This document includes configuration best practices and procedural recommendations for the most common protocols and features deployed in production networks. It is intended to supplement the Cisco Nexus 7000 Series Switches product documentation that is available on cisco.com and should not be used as a replacement for that documentation. This document is organized in feature specific chapters to add structure and clarity when protocols and features are related to each other. It is important to understand that the recommended best practices do not need to be implemented simultaneously or in any particular order. Not all best practice recommendations are applicable to every network environment. 1-1

Chapter 1 Overview. 1-2

CHAPTER 2 Initial Configuration This chapter provides Cisco NX-OS best practices that are that typically configured when a Cisco Nexus 7000 Series switch is powered up for the first time and the user is connected to the RS-232 console port on the active supervisor module. This chapter includes the following sections: Setup Utility (First Time Setup) Global Configuration Parameters Power Budget Cisco NX-OS Licensing Setup Utility (First Time Setup) The Setup Utility is automatically executed when a Cisco Nexus 7000 chassis is powered up for the first time, or if the configuration is erased with the write erase command, and the chassis is reloaded (The Setup Utility can also be manually executed any time using the setup Exec command). The Setup Utility was created to assist the administrator with some initial configuration parameters, but is not required and can be bypassed if the administrator chooses to do so. The following table contains the parameters that can be configured using the Setup Utility. If the Setup Utility is bypassed, the value in the Default Value column will be automatically configured. The Initial Startup Parameters are always required. Table 2-1 Required Initial Startup Parameters Initial Startup Parameter (Required) Enforce Secure Password Standard Admin Password Default Value yes no default Table 2-2 Optional Startup Utility Startup Utility (Optional) Create another login account Configure read-only SNMP community string Default Value no no 2-1

Global Configuration Parameters Chapter 2 Initial Configuration Table 2-2 Optional Startup Utility (continued) Startup Utility (Optional) Configure read-write SNMP community string Enter switch name Enable License Grace Period Out-of-band (mgmt0) management configuration Mgmt0 IPV4 address Mgmt0 IPv4 netmask Configure the default gateway IPv4 address of the default gateway Configure advanced IP options Enable Telnet service Enable SSH service Type of SSH Key (dsa/rsa) no no default no yes no default no default yes no default no no yes RSA Number of RSA Key bits 1024 Configure the NTP server Configure the Default Interface Layer (L3/L2) Configure the default switchport interface state (shut/no shut) Configure best practices CoPP profile (strict/moderate/lenient/none) Configure CMP processor on current sup (Slot 5) CMP IPv4 address IPv4 address of the default gateway Configure CMP processor on current sup (Slot 6) CMP IPv4 address IPv4 address of the default gateway Default Value no L3 shutdown strict yes no default no default yes no default no default Global Configuration Parameters This section provides Cisco NX-OS best practices that are recommended when configuring global parameters related to general system management. Terminal CLI Access (SSHv2) Cisco NX-OS software supports SSHv2 and Telnet for remote terminal CLI access. SSHv2 is enabled by default and is preferred since it increases security with encryption. If SSHv2 is disabled, it can be enabled with the feature ssh command (The feature ssh command is not displayed in the 2-2

Chapter 2 Initial Configuration Global Configuration Parameters running-configuration when it is enabled). SSHv2 uses a 1024 bit RSA key by default. The ssh key command can be used to create a new or stronger RSA/DSA key. If a key is already configured, the force option can be used to overwrite the existing key. n7000(config)# feature ssh n7000(config)# ssh key rsa 2048 Note In Cisco NX-OS Release 4.0(1) SSHv2 was enabled with the service ssh command. It was changed to feature ssh in Cisco NX-OS Release 4.1(2). Hostname A recognizable hostname should be configured to identify the Cisco Nexus 7000 Series device when administrators access the CLI. If Virtual Device Contexts (VDCs) are configured, a unique hostname should be configured per VDC. n7000(config)# hostname N7K-1-Core-L3 Boot Variables Boot variables specify what version of Cisco NX-OS software boots after a system has been reloaded. The boot variables should always be configured to ensure the expected version of Cisco NX-OS software is booted if an unplanned chassis reload occurs. A kickstart and system image are required to properly boot a Cisco Nexus 7000 Series switch. (The image version numbers have to match.) Cisco NX-OS images can be booted from bootflash: or slot0: (bootflash: is recommended since the memory cannot be removed from the supervisor module). In the following example, Cisco NX-OS Release 5.1(1) kickstart and system boot variables are configured for both supervisor modules in the chassis (default behavior) since the sup-1 and sup-2 options have been omitted. n7000(config)# boot kickstart bootflash:n7000-s1-kickstart.5.1.1.bin n7000(config)# boot system bootflash:n7000-s1-dk9.5.1.1.bin MOTD Login Banner A Message Of The Day (MOTD) login banner is recommended to notify users they are attempting to log into a device. This banner will be displayed prior to the user authentication process and serves as a warning to deter unauthorized users from attempting to log in. The end delimiter character cannot be used within the contents of the banner. The following example uses a capital Z. (Production devices should have a more detailed disclaimer.) n7000(config)# banner motd Z Enter TEXT message. End with the character 'Z'. > Authorized Access Only! > Z n7000(config)# 2-3

Power Budget Chapter 2 Initial Configuration Password Strength-Check Introduced: Cisco NX-OS Release 4.1(2) The Password Strength-Check feature is enabled by default to force users to configure secure passwords when configuring users in the local database for authentication. We recommend that you keep the Password Strength-Check feature enabled. If it is disabled, it can be enabled with the following global configuration command. n7000(config)# password strength-check Power Budget The power budget can be monitored and managed using the show environmental power command. Cisco NX-OS Release 5.0(2a) introduced real-time power draw for the fan trays and all I/O modules released in Cisco NX-OS Release 5.x software. The configured power redundancy mode determines how the available power is allocated (See the next section for details on the power redundancy mode.) n7000# show environment power pow_reserved 4800 Power Supply: Voltage: 50 Volts Power Actual Total Supply Model Output Capacity Status (Watts ) (Watts ) ------- ------------------- ----------- ----------- -------------- 1 N7K-AC-6.0KW 786 W 6000 W Ok 2 N7K-AC-6.0KW 830 W 6000 W Ok 3 ------------ 0 W 0 W Absent Actual Power Module Model Draw Allocated Status (Watts ) (Watts ) ------- ------------------- ----------- ----------- -------------- 3 N7K-M108X2-12L 395 W 650 W Powered-Up 4 N7K-M108X2-12L 382 W 650 W Powered-Up 5 N7K-SUP1 N/A 210 W Powered-Up 6 N7K-SUP1 N/A 210 W Powered-Up Xb1 N7K-C7010-FAB-1 N/A 60 W Powered-Up Xb2 N7K-C7010-FAB-1 N/A 60 W Powered-Up Xb3 N7K-C7010-FAB-1 N/A 60 W Powered-Up Xb4 N7K-C7010-FAB-1 N/A 60 W Powered-Up Xb5 N7K-C7010-FAB-1 N/A 60 W Powered-Up fan1 N7K-C7010-FAN-S 116 W 720 W Powered-Up fan2 N7K-C7010-FAN-S 116 W 720 W Powered-Up fan3 N7K-C7010-FAN-F 11 W 120 W Powered-Up fan4 N7K-C7010-FAN-F 11 W 120 W Powered-Up N/A - Per module power not available Power Usage Summary: -------------------- Power Supply redundancy mode (configured) Power Supply redundancy mode (operational) Total Power Capacity (based on configured mode) Total Power of all Inputs (cumulative) Total Power Output (actual draw) Redundant Redundant 6000 W 12000 W 1616 W 2-4

Chapter 2 Initial Configuration Cisco NX-OS Licensing Power Redundancy Mode The recommended power redundancy mode will vary per Cisco Nexus 7000 Series chassis depending on the number of power supplies and the number of inputs and associated input voltage (110v/220v). Each redundancy mode provides different power allocations to allow the administrator to select the mode that is best suited for their installation. The default mode is ps-redundant, which is recommended for most installations. Use caution when configuring combined mode, since power redundancy will not be available for the chassis. Table 2-3 Power Redundancy Mode Redundancy Mode combined insrc-redundant ps-redundant redundant Description This mode does not provide power redundancy for the chassis All input power is available to the chassis. (Power is not reserved for backup as with the other modes) Input Source (GRID) Redundancy The available power is based on the lesser of the two grids through the power supplies. The difference (50%) is reserved for backup. Power Supply Redundancy Provides an extra power supply in the event one fails or is removed from the chassis. Input Source (GRID) + Power Supply Redundancy The available power is the lesser of the available power for the power supply mode and input source voltage. The difference (50%) is reserved for backup. n7000(config)# power redundancy-mode redundant Powering Off Unused I/O and Fabric Modules We recommend that you power off all I/O (Ethernet) and fabric modules that are not in use to reduce unnecessary power draw. We also recommend that you power off all I/O and fabric modules slots that are not installed to give the administrator control when powering them up. This reduces risk by preventing newly installed modules from powering up outside of a change control window. n7000(config)# poweroff module 1 n7000(config)# poweroff xbar 4 n7000(config)# poweroff module 3 NOTICE: module <3> status is either absent or not powered up (or denied)... Proceeding anyway Cisco NX-OS Licensing This section contains a brief explanation of the Cisco NX-OS licensing model and installation procedure. Always install all required licenses to avoid unnecessary network outages that can occur if a licensed feature is enabled and the grace period expires. 2-5

Cisco NX-OS Licensing Chapter 2 Initial Configuration Installation Process The Cisco NX-OS licensing model allows features to be enabled on a pay as you grow basis. When you purchase a Cisco NX-OS license, you obtain a license file based on the chassis host ID that gets installed on a specific chassis. (Cisco NX-OS software allows Layer-2 connectivity with basic Layer-3 functionality by default.) If you do not have a license for a specific feature, a 120-day grace period can be enabled using the global license grace-period configuration command. (The grace period is not recommended for production networks.) After 120 days, all features that are enabled that require a license that is not installed on the chassis are automatically removed from the running-configuration. See the latest Cisco Nexus 7000 Series Licensing Configuration Guide for a list of features that are included with each license type. When two supervisor modules are installed in a chassis, the chassis is the only component that requires a new license to be reissued and reinstalled if it is replaced. All other components including a supervisor module can be replaced without having to reissue or reinstall the license. If only one supervisor module is installed in a chassis, a new license will have to be reinstalled from a backup copy if the supervisor module or the chassis is replaced. Licenses are installed per chassis in the default VDC (1). Installing a license is a non-disruptive procedure. Summary Installation Steps: 1. Obtain the chassis host ID, which is used to generate the license, by entering the show license host-id command. 2. Locate the Product Authorization Key (PAK) and go to the Product License Registration web page on cisco.com 3. Follow the instructions to generate the license file and download it. 4. Transfer the license file the Cisco Nexus 7000 Series supervisor module (i.e. bootflash: or slot0:) 5. Install the license using the following install license Exec command. n7000# install license bootflash:license_file.lic Installing license..done Verifying the License Status The Cisco NX-OS license status can be verified using the following command. n7000# show license usage Feature Ins Lic Status Expiry Date Comments Count -------------------------------------------------------------------------------- SCALABLE_SERVICES_PKG No - Unused - TRANSPORT_SERVICES_PKG No - Unused - LAN_ADVANCED_SERVICES_PKG No - Unused - LAN_ENTERPRISE_SERVICES_PKG No - Unused - -------------------------------------------------------------------------------- 2-6

Chapter 2 Initial Configuration Cisco NX-OS Licensing Backing Up a License File You should always keep your license files in a safe location in the event they have to be reinstalled. If you don t have a license file for a particular chassis, you can create a backup copy for the chassis if it already has the license installed. Once the backup file is created, it should be transferred to safe location. n7000# copy licenses bootflash:license_file.tar Backing up license done 2-7

Cisco NX-OS Licensing Chapter 2 Initial Configuration 2-8

CHAPTER 3 Connecting to the Management Network and Securing Access This chapter provides Cisco NX-OS recommended best practices for connecting a Cisco Nexus 7000 Series switch to the management network(s) and securing access to the CLI. This chapter includes the following sections: Out-of-Band Management Connectivity Console Port Configuration VTY Port Configuration Supervisor Management Port Configuration Access-List Logging Supervisor CMP Port Configuration Out-of-Band Management Connectivity A Nexus 7000 is typically managed using a combination of different connectivity methods that give the network administrator CLI access and the ability to manage the chassis using IP management protocols such as SNMP, Syslog and NTP. The following table illustrates the different connectivity methods available to manage a Nexus 7000 chassis. We recommend that you manage a chassis using a combination of out-of-band methods to separate the management traffic from the production traffic. This approach improves security by preventing Denial of Service (DoS) attacks originated from malicious users, or inadvertently by traffic over-subscription. It is important to understand the functionality that the supervisor module CMP port provides. The CMP port provides lights-out CLI console access to the supervisor module over an IP network using SSHv2 or Telnet. The CMP port allows an administrator to attach to the console, monitor the console, reload the supervisor module or the entire chassis. It does not provide in-band management capabilities for IP protocols like SNMP or NTP. Table 3-1 Connectivity Options for Port Types and Module Types Connectivity Options Port Type Module Type Out-of-band (RS-232 Serial CLI) Console port (recommended) Supervisor Auxiliary port Supervisor 3-1

Out-of-Band Management Connectivity Chapter 3 Connecting to the Management Network and Securing Access Table 3-1 Connectivity Options for Port Types and Module Types Connectivity Options Port Type Module Type Out-of-band (SSH/Telnet CLI) Connectivity Management Port Supervisor (CMP) recommended Out-of-band (SSH/Telnet CLI and Management port (mgmt0) Supervisor IP Mgmt) recommended In-band (SSH/Telnet CLI and IP Mgmt) Ethernet/Loopback/SVI, etc. I/O module To reduce the likelihood for loosing connectivity to a Nexus 7000 with two supervisor modules, we recommend connecting the console port, CMP, and the management port per supervisor module. The console ports should be connected to two different terminal servers and the supervisor CMP and mgmt0 ports should be connected to a redundant out-of-band Ethernet network to improve availability and security. The following diagram illustrates the connectivity required per chassis with redundant supervisor modules. Figure 3-1 Connectivity per Chassis with Redundant Supervisor Modules Terminal Servers Management switch 1 RS-232 RS-232 Management CMP Console Sup 1 Sup 2 Management CMP Management switch 2 254934 Note In this out-of-band management design, the CoPP policy should be modified to deny in-band management protocols if there are any IP addresses configured on I/O module ports such as Ethernet, loopbacks, port channels, SVIs, etc. Note This is just a basic example. Redundant network management designs are beyond the scope of this document. 3-2

Chapter 3 Connecting to the Management Network and Securing Access Console Port Configuration Console Port Configuration This section contains Cisco NX-OS recommended best practices for the console port. Exec-Timeout The console port should be configured with a timeout to automatically log off administrators who are idle for a specified time period. The console exec-timeout is disabled by default. A ten or fifteen minute timeout is usually acceptable for most security policies. n7000(config)# line console n7000(config-console)# exec-timeout 10 Port Speed The console port speed (baud rate) should be increased to the largest value supported by the connected terminal server. The console speed defaults to 9,600 bps and can be configured up to 115,200 bps. A larger value will improve the user experience by increasing the speed that data is displayed on the console port. n7000(config)# line console n7000(config-console)# speed 115200 VTY Port Configuration This section contains Cisco NX-OS recommended best practices for the VTY (Terminal) port configuration used for SSHv2 and Telnet sessions. Exec-Timeout The VTY port should be configured with a timeout to automatically log off users that are idle for a specified time period. The VTY exec-timeout is disabled by default. A ten or fifteen minute timeout is usually acceptable for most security policies. n7000(config)# line vty n7000(config-line)# exec-timeout 10 Session Limit The VTY session limit determines how many SSHv2 sessions, Telnet sessions, or both that can be active simultaneously. The session-limit defaults to 32 active sessions. This should be reduced to a more practical limit such as 5 or 10 sessions to improve security. 3-3

Supervisor Management Port Configuration Chapter 3 Connecting to the Management Network and Securing Access n7000(config)# line vty n7000(config-line)# session-limit 5 Access-List Introduced: Cisco NX-OS 5.1(1) An access class should be applied to the VTY port to increase security by restricting SSH and Telnet access to specific source and destination IP addresses. An access class configured on the VTY port is applicable when using an in-band or out-of-band management strategy. An access-class is configured per traffic direction, in applies to inbound sessions and out applies to outbound sessions. Statistics can be enabled with the access list statistics per-entry. The following example illustrates a basic policy that permits SSH traffic from a specific subnet to all IP addresses configured in the current VDC. All traffic is permitted if an access-class is applied to the VTY port and the associated access-list is deleted from the configuration. n7000(config)# ip access-list vty-acl-in n7000(config-acl)# permit tcp x.x.x.x/24 any eq 22 n7000(config)# line vty n7000(config-line)# ip access-class vty-acl-in in Supervisor Management Port Configuration This section contains the Cisco NX-OS recommended best practices for the supervisor module mgmt0 port. Access List The supervisor module mgmt0 port should be configured with an inbound access list to increase security by restricting access to specific source host/subnet addresses destined to specific management protocols configured on the Nexus 7000. The access-list entries will vary depending on the management protocols that are enabled. Access-list statistics can be tracked per ACL entry if the ACL command statistics per-entry is configured. The supervisor module CPU performs access-list processing when an access-list is applied to the mgmt0 port. n7000(config)# ip access-list mgmt0-access n7000(config-acl)# statistics per-entry n7000(config-acl)# permit tcp x.x.x.x/x b.b.b.b/32 eq 22 n7000(config-acl)# permit udp x.x.x.x/x b.b.b.b/32 eq snmp n7000(config-acl)# permit tcp x.x.x.x/x b.b.b.b/32 eq tacacs n7000(config-acl)# permit udp x.x.x.x/x b.b.b.b/32 eq ntp n7000(config)# interface mgmt0 n7000(config-if)# ip access-group mgmt0-access in n7000(config-if)# ip address b.b.b.b/xx 3-4

Chapter 3 Connecting to the Management Network and Securing Access Access-List Logging Access-List Logging Introduced: Cisco NX-OS Release 5.0(2a) Access lists can be configured on the mgmt0 port to collect additional data per entry using the log keyword. The access-list logging cache can be displayed to audit the data collected from the logged access-list entry. n7000(config)# ip access-list mgmt0-access n7000(config-acl)# permit tcp x.x.x.x/x b.b.b.b/32 eq 22 log n7000# show log ip access-list cache Source IP Destination IP S-Port D-Port Interface Protocol Hits ---------------------------------------------------------------------------------------- x.x.x.x x.x.x.x 60741 22 mgmt0 (6)TCP 136 Number of cache entries: 1 ---------------------------------------------------------------------------------------- Supervisor CMP Port Configuration This section contains the Cisco NX-OS recommended best practices for configuring the supervisor module Connectivity Management Port (CMP). Access List The supervisor module CMP port should be configured with an access list to increase security by restricting access to specific source host/subnets addresses destined to specific management protocols enabled on the CMP port. SSHv2 is typically the only protocol required on the CMP port. Use the attach cmp command to configure the CMP port with an access-list. n7000-cmp5(config)# ip access-list cmp-access n7000-cmp5(config-acl)# permit tcp x.x.x.x 0.0.0.0 range 1024 65535 b.b.b.b 0.0.0.0 range 22 22 n7000-cmp5(config)# interface cmp-mgmt n7000-cmp5(config-if)# ip address b.b.b.b/xx n7000-cmp5(config-if)# ip access-group cmp-access in Note The access-list syntax on the CMP port differs from the Cisco NX-OS access-list syntax. 3-5

Supervisor CMP Port Configuration Chapter 3 Connecting to the Management Network and Securing Access 3-6

CHAPTER 4 Protecting the CPU This chapter provides the recommended best practices for protecting the CPU against Denial of Service (DoS) attacks. This chapter includes the following sections: CoPP Policy CPU Rate Limit Logging CoPP Policy This section contains a brief overview of the Control Plane Policing (CoPP) Policy. The CoPP policy is an important security feature that prevents Denial of Service (DoS) attacks that can impact the supervisor module CPU. The Cisco NX-OS software defaults to a strict policy that was developed to protect the CPU from the most common threats. We recommend that you enable a CoPP policy any time IP addresses are configured on an I/O module port such as an Ethernet port, SVI, port-channel, etc. A detailed explanation and recommendation for the CoPP Policy is outside the of scope for this document. Denying In-Band Management Protocols While this document does not cover the CoPP policy in detail, we recommend that you modify the CoPP policy to drop in-band management traffic destined to the Cisco Nexus 7000 Series switches to increase security. If all IP management traffic is traversing the out-of-band management network, there should not be any need to receive any IP management traffic in-band. The CoPP policy does not get applied to traffic received on the mgmt0 interface. Recommended steps: 1. Identify the enabled management protocols that should have their traffic dropped in-band, such as SSHv2, SNMP, SCP, TFTP, FTP, etc. 2. Create a new access control list(s) and a new class map(s), or reference the existing class map with the class-map type control-plane match-any copp-system-class-management command that references existing access control lists. 3. Insert the new class map or modify the existing class map identified in step 2 in the existing CoPP service policy (copp-system-policy), and then configure it to drop all traffic that conforms to the policy. 4-1

CPU Rate Limit Logging Chapter 4 Protecting the CPU This example uses the existing copp-system-class-management class-map and associated ACLs. The police rate was modified to aggressively drop traffic that conforms to the policy. n7000(config)# policy-map type control-plane copp-system-policy n7000(config-pmap)# class copp-system-class-management n7000(config-pmap-c)# police 1 conform drop Note As of Cisco NX-OS Release 5.1(1), the default copp-system-class-management class map contains the following protocols: FTP, NTP, NTP6, RADIUS, SFTP, SNMP, SSH, SSH6, TACACS, Telnet, TFTP, TFTP6, RADIUS, TACACS6, and Telnet6. Syslog Message Thresholds Introduced: Cisco NX-OS Release 5.1(1) A Syslog message threshold can be configured per CoPP class map under the control plane policy map. We recommend that you configure a Syslog message threshold for class maps as a method to inform the proper personnel that the CoPP policy is dropping traffic. The following example configures a threshold at 39,600 kb/s with a severity level of 5, so packet drops within the critical class (routing protocols) are logged. n7000(config)# policy-map type control-plane copp-system-policy n7000(config-pmap)# class copp-system-class-critical n7000(config-pmap-c)# logging drop threshold 39600000 level 5 Syslog Message Example: n7000# show log logfile %COPP-5-COPP_DROPS5: CoPP drops exceed threshold in class: copp-system-class-critical, check show policy-map interface control-plane for more info. CPU Rate Limit Logging Introduced: Cisco NX-OS Release 5.1(1) This section was included for reference and may not be required. Rate limiting can be configured globally and per interface to create a system log message if packets sent to or from the supervisor module CPU exceed the configured packet per second (pps) threshold. The rate limiter can be configured to measure traffic based on direction using the input (received), output (transmitted) or both (configures received and transmitted simultaneously) options. The global default threshold is 10,000 pps configured for both. The threshold can be modified to a value between 0 and 100,000 pps. This feature can be applied globally and per interface. This feature does not drop packets; it only sends a notification log message. Global Configuration: n7000(config)# rate-limit cpu direction both pps 2000 action log Per Interface Configuration: n7000(config)# interface ethernet 1/26 n7000(config-if)# rate-limit cpu direction both pps 2000 action log 4-2

Chapter 4 Protecting the CPU CPU Rate Limit Logging Verification: Global Verification: n7000# show system internal pktmgr internal control sw-rate-limit inband pps global threshold 2000 outband pps global threshold 2000 Per Interface Verification: n7000# show system internal pktmgr interface ethernet 1/26 Ethernet1/26, ordinal: 305 SUP-traffic statistics: (sent/received) Packets: 5412033 / 6677105 Bytes: 1614312187 / 2003104556 Instant packet rate: 2872 pps / 2871 pps Packet rate limiter (Out/In): 2000 pps / 2000 pps Average packet rates(1min/5min/15min/ewma): Packet statistics: Tx: Unicast 5365387, Multicast 46640 Broadcast 6 Rx: Unicast 6677093, Multicast 0 Broadcast 12 Syslog: n7000# show log logfile %NETSTACK-5-NOTICE: netstack [3647] Ingress PPS (2861) exceeding threshold on i/f Ethernet1/26 4-3

CPU Rate Limit Logging Chapter 4 Protecting the CPU 4-4

CHAPTER 5 Integrated Intrusion Detection Security The Cisco NX-OS software provides IPv4 and IPv6 Intrusion Detection packet checks to increase security in the network by dropping packets that match specific criteria that are typically not required in most production networks. Most Intrusion Detection System (IDS) packet checks are enabled by default and should be left enabled unless there is a specific reason to disable them. This chapter includes the following sections: Verifying IDS Check Status and Counters Disabling/Enabling IDS Packet Checks Verifying IDS Check Status and Counters The show hardware forwarding ip verify command should be used to verify the IDS packet check status and associated counters. The module option displays counters for a specific module as opposed to all modules. The Packets Failed counter displays the number of packets dropped for each IDS packet check. This output can be useful when troubleshooting potential network related application issues. In some rare situations, an IDS packet check may need to be disabled if an application meets the IDS packet check criteria. Cisco NX-OS Release 5.0(3) introduced Syslog messages and Embedded Event Manager (EEM) trigger support when packets are dropped. The IDS packet check counters can be cleared using the clear hardware forwarding ip verify protocol command. The module option allows the administrator to clear the counters for a specific module. n7000# show hardware forwarding ip verify IPv4 and v6 IDS Checks Status Packets Failed -----------------------------+---------+------------------ address source broadcast Enabled 0 address source multicast Enabled 0 address destination zero Enabled 0 address identical Enabled 0 address reserved Enabled 0 address class-e Disabled -- checksum Enabled 0 protocol Enabled 0 fragment Disabled -- length minimum Enabled 0 length consistent Enabled 0 length maximum max-frag Enabled 0 length maximum udp Disabled -- length maximum max-tcp Enabled 0 5-1

Disabling/Enabling IDS Packet Checks Chapter 5 Integrated Intrusion Detection Security tcp flags Disabled -- tcp tiny-frag Enabled 0 version Enabled 0 -----------------------------+---------+------------------ IPv6 IDS Checks Status Packets Failed -----------------------------+---------+------------------ length consistent Enabled 0 length maximum max-frag Enabled 0 length maximum udp Disabled -- length maximum max-tcp Enabled 0 Disabling/Enabling IDS Packet Checks This section was included for reference and may not be required. There may be some situations when an IDS packet check needs to be disabled for an application to function properly. The following global command can be used to disable and enable a packet check. This example disables and enables the length maximum max-tcp IDS check. Other packet checks can be configured using the same procedure. n7000(config)# no hardware ip verify length maximum max-tcp n7000(config)# hardware ip verify length maximum max-tcp 5-2

CHAPTER 6 Cisco NX-OS Software Upgrade or Downgrade This chapter provides the Cisco NX-OS best practices for upgrading and downgrading Cisco NX-OS system software. The Cisco NX-OS system software can be upgraded or downgraded using two different methods. The In-Service-Software-Upgrade (ISSU) is the recommended procedure, especially when performing a nondisruptive upgrade for a chassis that has two supervisor modules installed. However, the traditional method is documented as well since it is applicable to lab environments and production environments that may require a fast downgrade. This chapter includes the following sections: Recommended Upgrade Procedure (ISSU) Verifying Software Compatibility (ISSU and Chassis Reload) Traditional Upgrade or Downgrade Procedure (Chassis Reload) Recommended Upgrade Procedure (ISSU) An In-Service-Software-Upgrade (ISSU) allows a Nexus 7000 with two supervisor modules to be upgraded or downgraded with a single command. It automatically changes the boot variables, performs a compatibility check, and prompts the administrator to continue once he or she has verified the expected outcome. Once the process starts, it upgrades the system software seamlessly without any downtime. The chassis continues to forward packets (hitless) throughout the process while the individual chassis components are upgraded. The upgrade or downgrade time will vary (30 50 minutes) depending on the chassis type and how many modules are installed. The CMP port on each supervisor module will require a manual reload to complete the process. This manual step prevents users from being disconnected if they are monitoring the procedure from the CMP ports. For best results, follow these recommendations: Connect to both supervisor modules console or CMP ports if you want to monitor the entire upgrade (which we recommend you do). Only perform ISSU upgrades in stable environments where there are no link flaps, STP state changes, etc. You cannot perform an ISSU if a Session Manager session is active. The active session must be committed, aborted, or saved. n7000# install all kickstart bootflash:n7000-s1-kickstart.5.1.1.bin system bootflash:n7000-s1-dk9.5.1.1.bin n7000# reload cmp module 5 6-1

Verifying Software Compatibility (ISSU and Chassis Reload) Chapter 6 Cisco NX-OS Software Upgrade or Downgrade n7000# reload cmp module 6 Note This procedure can be used for a chassis with one supervisor module, but the process is disruptive because the chassis requires a reload. Verifying Software Compatibility (ISSU and Chassis Reload) Before downgrading software, verify if there are any incompatibilities to make sure features can be properly disabled before performing the downgrade. This will inform the administrator if there are any features that will be automatically removed from the configuration and allow the administrator to take action prior to the downgrade. This command should be run regardless if the ISSU or traditional downgrade method is performed. n7000# show incompatibility-all system bootflash:n7000-s1-dk9.4.2.4.bin Checking incompatible configuration(s) for vdc 'n7000': --------------------------------------------------------------- <CLI Output Omitted> 6) Service : otv, Capability : CAP_FEATURE_OTV Description : Overlay Transport Virtualization Capability requirement : STRICT Disable command : no feature otv 7) Service : bfd, Capability : CAP_FEATURE_BFD_V2 Description : Feature bfd is enabled. Capability requirement : STRICT Disable command : Disable bfd using"no feature bfd" <CLI Output Omitted> Traditional Upgrade or Downgrade Procedure (Chassis Reload) The traditional upgrade procedure is documented because it is recommended for these specific scenarios: In lab environments where continuous uptime is not a requirement In production environments in the unlikely event that an upgrade needs to be downgraded in a timely manner In situations where ISSU or ISSD is not supported for the respective images Before you begin, save and back up all configurations before reloading the system to load the new software. Follow these steps to upgrade the Cisco NX-OS software: 1. Configure the boot variable for the Cisco NX-OS software kickstart image. n7000# boot kickstart bootflash:n7000-s1-kickstart.5.2.1.bin 2. Configure the boot variable for the Cisco NX-OS software system image. n7000# boot system bootflash:n7000-s1-dk9.5.2.1.bin 6-2

Chapter 6 Cisco NX-OS Software Upgrade or Downgrade Traditional Upgrade or Downgrade Procedure (Chassis Reload) 3. Save the running configuration to the startup configuration. n7000# copy running-config startup-config vdc-all 4. Verify that the Current Boot Variables and the Boot Variables on next reload match the expected image. n7000# show boot Current Boot Variables: sup-1 kickstart variable = bootflash:/n7000-s1-kickstart.5.2.1.bin system variable = bootflash:/n7000-s1-dk9.5.2.1.bin Boot Variables on next reload: sup-1 kickstart variable = bootflash:/n7000-s1-kickstart.5.2.1.bin system variable = bootflash:/n7000-s1-dk9.5.2.1.bin 5. Verify that the image location matches the above boot statements. In redundant supervisor chassis, the images auto-synchronize from active to standby once the boot statements are set. n7000# show boot auto-copy list n7000# dir bootflash://sup-active/ 161980383 Aug 15 17:52:03 2011 n7000-s1-dk9.5.2.1.bin 29471232 Aug 15 18:01:38 2011 n7000-s1-kickstart.5.2.1.bin n7000# dir bootflash://sup-standby/ 161980383 Aug 15 18:04:55 2011 n7000-s1-dk9.5.2.1.bin 29471232 Aug 15 18:06:18 2011 n7000-s1-kickstart.5.2.1.bin 6. After you verify the image location and statements, reload the Cisco NX-OS device. n7000# reload 6-3