Cisco ACI 6.0(4c)(F) リリース
Cisco ACi 6.0(4c)F がリリースされました。
- Application Policy Infrastructure Controller (APIC) Release 6.0(4c) F
- Cisco Application Policy Infrastructure Controller Release Notes, Release 6.0(4)
- Cisco Nexus 9000 ACI-Mode Switches Release Notes, Release 16.0(4)
New Software Features¶
Base functionality¶
Support for associating a static VLAN pool to a VMM domain¶
You can now associate a static or dynamic VLAN pool to a VMM domain. In earlier releases, only a dynamic VLAN pool was supported.
For more information, see the "Cisco ACI Virtual Machine Networking" chapter of the Cisco ACI Virtualization Guide, Release 6.0(x).
Support for control plane MTU policy values smaller than 1,500 bytes¶
You can now configure the control plane MTU policy to set the fabric and in-band management MTU of the APIC to the control plane MTU when the control plane MTU is configured for less than 1,500 bytes.
For more information, see the "Basic Operations" chapter of the Cisco APIC System Management Configuration Guide, Release 6.0(x).
Cisco ACI Multi-Site support for vzAny PBR and L3Out-to-L3Out PBR use cases¶
This release allows you to enable the following new use cases for policy-based redirect (PBR) Multi-Site:
- One-arm firewall insertion
- One-arm load balancer insertion
For more information, see the Cisco Nexus Dashboard Orchestrator Configuration Guide for ACI Fabrics, Release 4.2(x).
Supported for stretching a non-vPC L3Out SVI across remote leaf switches¶
You can now stretch a non-vPC L3Out SVI across remote leaf switches.
For more information, see the "Tenant Routed Multicast" chapter of the Cisco APIC Layer 3 Networking Configuration Guide, Release 6.0(x).
Ease of Use¶
Streamlined navigation and editing of the stat collection threshold from a TCA fault¶
When the Cisco APIC generates a threshold crossing alert (TCA) fault, the GUI now enables you easily to go to the screen for editing the stat collection threshold.
Security¶
RSA key 307 and 4096 support on X.509 certificates¶
Cisco APIC now supports RSA key 307 and 4096 on X.509 certificates.
Changes in Behavior¶
- In case of failed login attempts, a detailed description of the reasons for failure are displayed under System > History > Session Logs in the Cisco APIC GUI. These details, along with the username, are also available on external servers, such as TACACS accounting or syslog servers (if external logging is configured).
Feature Deprecation and End of Support Notice¶
The following features will no longer be supported starting with the Cisco ACI 6.0(6) release:
- CloudSec encryption
- Cisco ACI vRealize 8 plug-in