Cisco AP776A - Nexus Converged Network Switch 5020 Примітка до випуску - Сторінка 8

Переглянути онлайн або завантажити pdf Примітка до випуску для Перемикач Cisco AP776A - Nexus Converged Network Switch 5020. Cisco AP776A - Nexus Converged Network Switch 5020 26 сторінок. Cisco nexus 5000 series release notes release 4.1(3)n1(1) (ol-16601-01 h0, july 2009)
Також для Cisco AP776A - Nexus Converged Network Switch 5020: Примітка до випуску (48 сторінок), Примітка до випуску (44 сторінок), Примітка до випуску (26 сторінок), Примітка до випуску (22 сторінок), Короткий довідник (14 сторінок), Примітка до випуску (3 сторінок)

Cisco AP776A - Nexus Converged Network Switch 5020 Примітка до випуску
Limitations
S e n d d o c u m e n t a t i o n c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m
SPAN Limitations on Fabric Extender Ports
Cisco Nexus 5000 Series and Cisco Nexus 2000 Series Release Notes, Release 4.1(3)N1(1)
8
VACLs of more than one type on a single VLAN are unsupported. NX-OS software supports only a
single type of VACL (either MAC, IPv4, or IPv6) applied on a VLAN. When a VACL is applied to
a VLAN, it replaces the existing VACL if the new VACL is a different type. For instance, if a MAC
VACL is configured on a VLAN and then an IPv6 VACL is configured on the same VLAN, the IPv6
VACL gets applied and the MAC VACL is removed.
A MAC ACL is applied only on non-IP packets. Even if there is a match eth type = ipv4 statement
in the MAC ACL, it does not match an IP packet. To overcome this situation, use IP ACLs to apply
access control to IP traffic instead of using a MAC ACL that matches the Ethertype to Ipv4 or Ipv6.
If a port drains traffic at a rate less than 100 Kbps, it is errdisabled in 10 seconds to avoid buffer
exhaustion. However, if the drain rate is larger than 100 Kbps, the port may not be consistently
errdisabled within 10 seconds. This could cause ingress buffers to be exhausted leading to frames
being discarded. Use the shut command to disable the slow-draining port.
The multicast storm control functionality in the Cisco Nexus 5000 Series hardware does not
distinguish between IP, non-IP, registered, or unregistered multicast traffic. All multicast traffic is
subject to a single multicast storm control policer when configured.
Multiple boot kickstart statements in the configuration are not supported.
If you remove an expansion module with Fibre Channel ports, and the cable is still attached, the
following FCP_ERRFCP_PORT errors are displayed:
2008 May 14 15:55:43 switch %KERN-3-SYSTEM_MSG: FCP_ERRFCP_PORT:
gat_fcp_isr_ip_fcmac_sync_intr@424, jiffies = 0x7add9a:Unknown intr src_id 42 - kernel
2008 May 14 15:55:43 switch %KERN-3-SYSTEM_MSG: FCP_ERRFCP_PORT:
gat_fcp_isr_ip_fcmac_sync_intr@424, jiffies = 0x7add9a:Unknown intr src_id 41 - kernel
These messages are informational only, and result in no loss of functionality.
Ports on a Fabric Extender (FEX) can be configured as a tx-source in one sesssion only.
If two ports on the same FEX are enabled to be tx-source, the ports need to be in the same session.
If you configure a FEX port as a tx-source and another port belonging to the same FEX is already
configured as a tx-source on a different SPAN session, then a error is displayed on the CLI.
In the following example, and Interface Ethernet100/1/1 on a FEX 100 is already configuredas a
tx-source on SPAN sesssion-1:
swor28(config-monitor)# show running-config monitor
version 4.0(1a)N2(1)
monitor session 1
source interface Ethernet100/1/1 tx
destination interface Ethernet1/37
no shut
If you add aan interface Ethernet100/1/2 as a tx-source to a different SPAN session (session-2) the
the following error is displayed:
swor28(config)# monitor session 2
swor28(config-monitor)# source interface ethernet 100/1/2 tx
ERROR: Eth100/1/2: Ports on a fex can be tx source in one session only
swor28(config-monitor)#
When a FEX port is configured as a tx-source, the multicast traffic on all VLANs for which the
tx-source port is a member, will be SPAN-ed. The FEX port sends out only multicast packets that
are not filtered by IGMP snooping. For example, if FEX ports 100/1/1-12 are configured on VLAN
OL-16601-01