Driver Support Document

Cisco Nexus Switches, 1000, 3000, 5000, 6000, 7000, & 9000 series, NX-OS version 4.x, 5.x, 6.x, 7.x, 8.x

Show Tested Devices Grid

SYSOID Mapping
SYSOID MODEL OS VERSION
 1.3.6.1.4.1.9.12.3.1.3.612 Nexus7010 4.0(4), 4.1(4), 4.2(4), 5.0(3), 5.1.1a, 5.2(1), 6.0(1)
 1.3.6.1.4.1.9.12.3.1.3.651 MDS 9222i 4.1(3a)
 1.3.6.1.4.1.9.12.3.1.3.719 Nexus5020 4.0(1a)N2(1), 4.1(3)N2(1a), 4.2(1)N1(1a)
 1.3.6.1.4.1.9.12.3.1.3.777 Nexus7018 5.1(3), 5.1(4), 5.2(1), 5.2(4), 5.2(5), 5.2(7), 5.2(9)
 1.3.6.1.4.1.9.12.3.1.3.798 Nexus5010 4.1(3)N2(1)
 1.3.6.1.4.1.9.12.3.1.3.840 Nexus1000V 4.0(4)SV1(1)
 1.3.6.1.4.1.9.12.3.1.3.903 Nexus4000 4.1(2), 4.1(2)E1(1i), 4.1(2)E1(1j), 4.1(2)E1(1k)
 1.3.6.1.4.1.9.12.3.1.3.907 Nexus1010 4.2(6)
 1.3.6.1.4.1.9.12.3.1.3.932 Nexus7009 6.0(2), 8.2(1)
 1.3.6.1.4.1.9.12.3.1.3.1008 Nexus5548 5.0(3)N1(1a), 5.2(1)N1(3)
 1.3.6.1.4.1.9.12.3.1.3.1038 Nexus5596 5.0(3)N1(1c), 5.2(1)N1(3)
 1.3.6.1.4.1.9.12.3.1.3.1060 Nexus3064 5.0(3)U1(1c)
 1.3.6.1.4.1.9.12.3.1.3.1084 Nexus5548UP 5.0(3)N2(2), 5.1(3)N2(1), 5.2(1)N1(1), 5.2(1)N1(3), 7.0(1)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1105 Nexus3064-E 5.0(3)U2(1)
 1.3.6.1.4.1.9.12.3.1.3.1106 Nexus3048 5.0(3)U2(1)
 1.3.6.1.4.1.9.12.3.1.3.1107 Nexus3016 6.0(2)U6(4)
 1.3.6.1.4.1.9.12.3.1.3.1147 Cisco7004 6.1(2)
 1.3.6.1.4.1.9.12.3.1.3.1163 Cisco3064 5.0(3)U3(2b)
 1.3.6.1.4.1.9.12.3.1.3.1170 Cisco1000V 5.2(1)SM1(5.2b)
 1.3.6.1.4.1.9.12.3.1.3.1237 Cisco6004 6.0(2)N1(2a)
 1.3.6.1.4.1.9.12.3.1.3.1238 Cisco3548 5.0(3)A1(2)
 1.3.6.1.4.1.9.12.3.1.3.1239 Cisco3064T 6.0(2)U3(2)
 1.3.6.1.4.1.9.12.3.1.3.1291 Cisco1010X 4.2(1)SP1(6.2)
 1.3.6.1.4.1.9.12.3.1.3.1308 Cisco6001 6.0(2)N1(2)
 1.3.6.1.4.1.9.12.3.1.3.1327 MDS 9710 7.3(1)D1(1)
 1.3.6.1.4.1.9.12.3.1.3.1353 Cisco7710 6.2(2a)
 1.3.6.1.4.1.9.12.3.1.3.1354 Cisco7706 6.2(2a)
 1.3.6.1.4.1.9.12.3.1.3.1388 Cisco3172 6.0(2)U2(3)
 1.3.6.1.4.1.9.12.3.1.3.1389 Cisco3172-TQ 6.0(2)U6(6)
 1.3.6.1.4.1.9.12.3.1.3.1390 Cisco3132 6.0(2)U2(2)
 1.3.6.1.4.1.9.12.3.1.3.1409 Cisco56128P 7.0(2)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1410 Cisco5672UP 7.0(3)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1467 Cisco9508 6.1(2)
 1.3.6.1.4.1.9.12.3.1.3.1489 Cisco6004 7.0(2)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1491 MDS 9148S 6.2(9)
 1.3.6.1.4.1.9.12.3.1.3.1507 Cisco9504 6.1(2)I2(2)
 1.3.6.1.4.1.9.12.3.1.3.1508 Cisco9396PX 6.1(2)I2(2)
 1.3.6.1.4.1.9.12.3.1.3.1510 Cisco93128TX 6.1(2)I3(3a)
 1.3.6.1.4.1.9.12.3.1.3.1539 Cisco5696 7.2(0)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1609 Cisco3164 6.1(2)I2(2)
 1.3.6.1.4.1.9.12.3.1.3.1619 Cisco5624Q 7.1(2)N1(1)
 1.3.6.1.4.1.9.12.3.1.3.1625 Cisco5548UP 7.0(3)I1(2)
 1.3.6.1.4.1.9.12.3.1.3.1626 Cisco9372PX 6.1(2)I3(1)
 1.3.6.1.4.1.9.12.3.1.3.1627 Cisco9372TX 6.1(2)I3(1)
 1.3.6.1.4.1.9.12.3.1.3.1666 Cisco3548P10GX 6.0(2)A6(5)
 1.3.6.1.4.1.9.12.3.1.3.1675 Cisco93120TX 7.0(3)I1(2)
 1.3.6.1.4.1.9.12.3.1.3.1697 Nexus3000 C3232C 7.0(3)I4(3)
 1.3.6.1.4.1.9.12.3.1.3.1712 Cisco9372PX-E 7.0(3)I2(2)
 1.3.6.1.4.1.9.12.3.1.3.1713 Nexus9000 C9372TX 7.0(3)I4(2)
 1.3.6.1.4.1.9.12.3.1.3.1726 Nexus3132 6.0(2)U6(5c)
 1.3.6.1.4.1.9.12.3.1.3.1727 Nexus3172 6.0(2)U6(6)
 1.3.6.1.4.1.9.12.3.1.3.1728 Nexus3172 6.0(2)U6(6)
 1.3.6.1.4.1.9.12.3.1.3.1744 Nexus9000 C92160YC-X 7.0(3)I4(1)
 1.3.6.1.4.1.9.12.3.1.3.1746 Nexus9000 C9236C 7.0(3)I5(2)
 1.3.6.1.4.1.9.12.3.1.3.1758 Nexus 31108PCV 7.0(3)I4(4)
 1.3.6.1.4.1.9.12.3.1.3.1788 Cisco3172 6.0(2)U2(3)
 1.3.6.1.4.1.9.12.3.1.3.1812 Nexus 93180YC-EX 7.0(3)I5(2)
 1.3.6.1.4.1.9.12.3.1.3.1824 Nexus 93108TC-EX 7.0(3)I4(6)
 1.3.6.1.4.1.9.12.3.1.3.1839 Cisco9232C 7.0(3)I4(6)
 1.3.6.1.4.1.9.12.3.1.9.85.8 Cisco3172 6.0(2)U2(1)

Driver Features Support Grid

Driver FeaturesAccess Methods
(X signifies feature support)CLISNMPTFTPCLI+TFTPSNMP+TFTPFTPCLI+FTPSNMP+FTPCLI+SFTPSCPCLI+SCPSNMP+SCPHTTP/HTTPS
X Driver Discovery release notes X X                      
X General Access release notes
(CLI protocols: telnet, ssh2, console)
Supports SecurID
X     X     X       X    
Configuration
X Retrieve Running Configuration release notes X     X     X       X    
X Retrieve Startup Configuration   X     X     X       X    
  Retrieve Binary Configuration                            
X Device information parsing  
X Enhanced Layer2 Basic IP information parsing  
X Configuration Deployment to Running         X     X       X    
  Configuration Deployment to Startup                            
  Binary Configuration Deployment                            
Diagnostics
X Routing Table   X                        
X OSPF Neighbors   X                        
X Interfaces   X                        
X Modules and Inventory   X                        
  Flash Storage Space                            
X File System   X                        
X Uptime   X X                      
X ICMP Test   X                        
X Topology Parsing   X                        
X Duplex Parsing   X                        
X Enhanced VLAN Parsing  
Features
X Software Center release notes       X     X       X    
X Software Image Synchronization release notes       X     X       X    
X Password Management  
(Can modify: limited username, limited password, read-only community strings, read/write community strings)
X                        
X Syslog Configuration and Change Detection   Syslog patterns X                        
X Custom Scripts and Diagnostics  
Bulk deploy available
X                        
X ACL Parsing  
X ACL Provisioning   X                        
X VLAN Provisioning   X                        
X Configlet Parsing  
X QoS Parsing  
X VRF Parsing  
X Context Management   X                        

General Access

Release Notes

Virtual Device Context IP interface detection

Cisco Nexus devices support creating contexts that can be independently addressible. When the inventory diagnostic is run, the driver will detect virtual device contexts (VDC) and log into to each context to determine its IP address. The first address reported for the external interface (default: "mgmt0") will be recorded as the address by which the context can be reached. To change this default, set the device access variable "extinterface" to the name of the interface that contains the IP address desired to reach the context. If no suitable IP address can be found, the context device will be managed through the admin context.

Disabling context management

The context management feature adds independent device entries for contexts on the device automatically by using the inventory diagnostic. This feature can be disabled by adding the access variable "disable_context" and setting it to true. Disabling the feature will remove any previously created context devices permanently and will result in the inability to directly manage contexts with NA. Changes will take effect the next time the NA Module Status diagnostic task is run.

return to top

Retrieve Running Configuration

Release Notes

Startup-config reordered

The Nexus 7000 series saves the startup-config with the commands in a different order than in the running-config. Because of this, the system will always detect a difference between the running-config and the startup-config, even when there is no difference. If the access variable "ignore_startup" is set to true, then all differences between running and startup will be ingnored.

Disconnected interfaces

Nexus devices sometimes store configuration information for disconnected interfaces in the startup configuration, which can cause differences with running that are meaningless. If the access variable "ignore_interfaces" is set to "true", NA will ignore interface sections when determining configuration differences. Any legitimate changes in the interface sections will be ignored when this flag is set.

Show Running All

Nexus devices can return the running configuration in an 'all' format, which includes even the default settings on the device. The device does not allow this setting for startup configurations, or for configurations gathered through transport protocols, so using this option will cause NA to report spurious configuration differences. To activate this option, set the device access variable "showConfigAll" to "true".

Premature TFTP completion

Nexus device have a known device bug that can cause the device to return s "completed" prompt from a TFTP transfer before the transfer is actually complete, causing a truncated copy of the configuration to be captured. Since this delay can change depending on the network, a variable timeout can be set to allow for correct behavior. Set the custom device access variable "tftp_timeout" to a value in seconds, and a delay will be enacted after the TFTP transfer to allow it to properly complete.

Handling of whitespace when comparing configurations

Nexus devices are known to introduce differences in whitespace between the running and startup configuration. As a result, whitespace is stripped from the configurations before any comparison. This process can be time- consuming and slow snapshots dramatically in some cases. To skip the stripping/ignoring of whitespace, set the device access variable "dont_skip_blanks" to "true".

Use the show inventory PID as the device model

return to top

General Access

Release Notes (inherited)

Password Assignment when creating Virtual Device Contexts

When creating a device context, the option is offered to specify a default password for the admin account. If left blank, the context will be created but not initialized, meaning that manual login must be performed to step through the device's configuration setup process. If a password is specified when the context is created, then the setup will be done automatically as part of the context creation task. Note that if this password does not meet the device's password criteria, the context setup process will be abandoned with a warning message.

Virtual Routing Context for Device Management

The Nexus series of switches support named routing contexts. NA uses the name "management" by default; if NA must connect to the device through another routing context, set the "vrf" custom access variable to contain the context used for device access.

Startup configuration deployment with reboot deprecated

The Nexus 7000 supports deployment of configuration to startup with reboot. However, the CLI command is reported as deprecated. Because the alternative provided is already doable by executing a Reboot task, followed by a Deploy to Running task, Deploy to Startup implementation is disabled.

Bulk command scripts require a trailing line

Nexus devices seem to ignore the last line in a script deployed by the bulk method, due to an apparent device bug. It is recommded to end your bulk scripts with a line containing only the comment character "!" to workaround this seeming device bug.

return to top

Software Center

Release Notes

Using Image Synchronization with an Update Device Software task

Some Nexus devices do not seem to allow the copying of a full image from the device, leaving 512 bytes uncopied and resulting in an invalid image file. If the image set resulting from an Image Synchronization does not install properly, download copies of the image from Cisco.com.

return to top

General Access

Release Notes (inherited)

Extra support for drivers that use HTTP

This note applies only for drivers that use HTTP requests for driver functions. HTTP proxy operations are supported by setting the device access variable "http_proxy" to "ip:port", replacing with the IP and port values of the proxy server. SNI-requiring devices (e.g CloudGenix & Cisco Meraki) can be supported by using the device access variable "alternate_host" to contain the DNS name of the host. The host name will be used rather than the normal management IP address for all HTTP requests, effectively supporting SNI.

return to top

Driver Discovery

Release Notes

More prompt causes an unexpected disconnection

Discovery tasks for Javascript drivers handle More prompts by using timeouts, which can cause problems with the third-party SSH client code, which interprets the timeout as a disconnection. There are two options to work around the problem. Setting the RCX option [<option name="Driver/Discovery/UsePollRead">true</option>] in site_options.rcx will effect the workaround for all affected devices. Alternatively, it could be applied to a single device by setting the device access variable "PollRead" to "true".

Wakeup Ctrl-U character can cause discovery to fail

Discovery tasks for Javascript drivers use wakeup characters are sent during device connection, to ensure that the device is responding. Normally, these characters do not echo to the console, but some devices may echo them. In this case, this causes the prompt detection phase to fail, which in turn can cause More prompts to not be handled properly, and discovery may fail. If these characters are echoed from the device [check the session log to see this], then set the device access variable "skip_ctrl_u" to skip the sending of the wakeup characters. Note that setting this option on a previously working device could cause discovery tasks to fail, but it only affects CLI discovery. SNMP discovery is unaffected.

return to top

Syslog Triggering

return to top