Cisco Nexus Integration for Elastic
| Version | 1.6.0 (View all) |
| Subscription level What's this? |
Basic |
| Developed by What's this? |
Elastic |
| Ingestion method(s) | File, Network Protocol |
| Minimum Kibana version(s) | 9.0.0 8.11.0 |
This AI-assisted guide was validated by our engineers. You may need to adjust the steps to match your environment.
The Cisco Nexus integration for Elastic enables you to collect and parse system messages and error logs from Cisco Nexus series switches running NX-OS. These modular and fixed-port network switches are designed for data center environments, and this integration provides critical visibility into the operational health and security status of your networking infrastructure.
This integration is compatible with the following Cisco Nexus products and operating systems:
- Cisco Nexus series switches: Tested against 9000 Series, 3172T, and 3048 models.
- Cisco NX-OS: Verified against NX-OS Release 6.x and is expected to work with later versions.
- Virtual Routing and Forwarding (VRF): Supports management and default VRF instances for log forwarding.
This integration collects data from your switches by receiving syslog messages over the network using UDP or TCP, or by reading from local log files. You'll deploy an Elastic Agent on a host that's configured as a syslog receiver or has access to the log files. The agent ingests the raw data, parses it into Elastic Common Schema (ECS) fields, and forwards it to your Elastic deployment where you can monitor, search, and visualize it.
The Cisco Nexus integration collects log messages of the following types:
- System messages: High-level operational logs including system start up information, module status, and process events.
- Error logs: Detailed error messages categorized by severity levels 0 through 7, which cover everything from emergency system failures to informational debugging data.
- Configuration events: Logs capturing when you enter configuration mode and any specific changes you've made to the switch running configuration.
Logs are primarily collected in Syslog format using RFC 3164 or RFC 5424.
Integrating Cisco Nexus logs with the Elastic Stack helps you monitor your network infrastructure more effectively. Key use cases include:
- System health monitoring to track module status and system processes.
- Troubleshooting and diagnostics using error logs across all severity levels to resolve issues quickly.
- Audit and compliance by monitoring configuration changes to maintain a record of switch modifications.
- Operational visibility to gain a centralized view of network events and correlate data with other system logs.
Before you can collect data, ensure your environment meets these requirements:
To collect logs from your Cisco Nexus devices, you'll need to ensure:
- You have administrative access with
network-adminor equivalent CLI access to the Cisco Nexus switch using SSH or console. - The switch has a network path to the Elastic Agent. If you're using a management VRF, you'll need to ensure routing is correctly configured.
- Your firewalls permit traffic on the configured port, which defaults to
9506. - You've synchronized switch clocks using NTP to ensure log timestamps are accurate for correlation in Kibana.
- Basic system management features are available, which are typically included in standard NX-OS images.
On the Elastic side, you'll need the following:
- An active Elastic Agent installed and enrolled in Fleet.
- An Elastic Stack deployment running Kibana version
8.11.0or higher. - Connectivity between the Elastic Agent and the Cisco Nexus switch over the designated syslog port using TCP or UDP.
Elastic Agent must be installed on a host that can receive syslog data or has access to the log files from the Cisco Nexus switch. For details on installation, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.
Elastic Agent is required to stream data from the syslog or log file receiver and ship the data to Elastic, where the events are processed using the integration's ingest pipelines.
You can configure your Cisco Nexus switch to send logs to the Elastic Agent using syslog (UDP or TCP) or by writing messages to a local file.
To configure syslog for UDP or TCP collection, follow these steps:
- Log in to the Cisco Nexus switch CLI using SSH or console.
- Enter global configuration mode:
switch# configure terminal - Set the timestamp granularity to milliseconds:
switch(config)# logging timestamp milliseconds - Configure the remote logging server pointing to the Elastic Agent IP:
- For UDP (Standard):
switch(config)# logging server <ELASTIC_AGENT_IP> 6 use-vrf <vrf_name> - For Secure TCP/TLS (NX-OS 9.2(1) and later):
switch(config)# logging server <ELASTIC_AGENT_IP> 6 port 6514 secure use-vrf <vrf_name>NoteNX-OS does not support standard (unencrypted) TCP syslog. The
securekeyword enables TLS-encrypted syslog on port6514. Ensure SSL is configured on the Elastic Agent TCP input to accept TLS connections, and update the integration's listen port to6514accordingly.
- For UDP (Standard):
- Specify the source interface for syslog traffic:
switch(config)# logging source-interface loopback 0 - Verify the logging configuration:
switch(config)# show logging server - Save the configuration:
switch(config)# copy running-config startup-config
To configure log file collection, follow these steps:
- Log in to the Cisco Nexus switch CLI.
- Configure the switch to write system messages to a local file:
switch# configure terminal switch(config)# logging logfile <FILENAME> <SEVERITY_LEVEL> - Ensure the Elastic Agent has file system access to the directory where the log file is stored.
For more information, refer to the Cisco documentation:
To set up the integration in Kibana, follow these steps:
- In Kibana, navigate to Management > Integrations.
- Search for Cisco Nexus and select the integration.
- Click Add Cisco Nexus.
- Configure the integration by selecting an input type and providing the necessary settings. This integration supports
TCP,UDP, andLog fileinputs.
Choose the setup instructions below that match your configuration:
This input collects logs over a TCP socket. Configure the following settings:
Listen Address(listen_address): The bind address to listen for TCP connections. Set to0.0.0.0to bind to all available interfaces. Default:localhost.Listen Port(listen_port): The TCP port number to listen on. Default:9506.Timezone Map(tz_map): A collection of timezones found in Cisco Nexus logs (as defined in eachtz_short), and the replacement value (as defined in eachtz_long) which should be the full proper IANA Timezone format. This is used to override vendor-provided timezone formats not supported by Elasticsearch Date Processors.Timezone Offset(tz_offset): When interpreting syslog timestamps without a time zone, use this timezone offset. Datetimes recorded in logs are by default interpreted in relation to the timezone set up on the host where the agent is operating.Preserve original event(preserve_original_event): Preserves a raw copy of the original event, added to the fieldevent.original. Default:false.Custom TCP Options(tcp_options): Specify custom configuration options for the TCP input, such asframing,max_message_size, ormax_connections.SSL Configuration(ssl): SSL configuration options for secure transmission. Refer to the SSL documentation for details.Tags(tags): Custom tags to add to the events. Default:['forwarded', 'cisco_nexus-log'].Preserve duplicate custom fields(preserve_duplicate_custom_fields): Preservecisco_nexus.logfields that were copied to Elastic Common Schema (ECS) fields. Default:false.Processors(processors): Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. Refer to Processors for details.
This input collects logs over a UDP socket. Configure the following settings:
Listen Address(listen_address): The bind address to listen for UDP connections. Set to0.0.0.0to bind to all available interfaces. Default:localhost.Listen Port(listen_port): The UDP port number to listen on. Default:9506.Timezone Map(tz_map): A collection of timezones found in Cisco Nexus logs, and the replacement value which should be the full proper IANA Timezone format.Timezone Offset(tz_offset): When interpreting syslog timestamps without a time zone, use this timezone offset.Preserve original event(preserve_original_event): Preserves a raw copy of the original event inevent.original. Default:false.Custom UDP Options(udp_options): Specify custom configuration options for the UDP input, such asmax_message_sizeandtimeout.Tags(tags): Custom tags to add to the events. Default:['forwarded', 'cisco_nexus-log'].Preserve duplicate custom fields(preserve_duplicate_custom_fields): Preservecisco_nexus.logfields that were copied to ECS fields. Default:false.Processors(processors): Processors used for agent-side filtering and metadata enhancement. Refer to Processors for details.
This input collects logs directly from files using the filestream input. Configure the following settings:
Paths(paths): A list of glob-based file paths to monitor.Timezone Map(tz_map): A collection of timezones found in Cisco Nexus logs, and the replacement value which should be the full proper IANA Timezone format.Timezone Offset(tz_offset): When interpreting syslog timestamps without a time zone, use this timezone offset.Preserve original event(preserve_original_event): Preserves a raw copy of the original event inevent.original. Default:false.Tags(tags): Custom tags to add to the events. Default:['forwarded', 'cisco_nexus-log'].Preserve duplicate custom fields(preserve_duplicate_custom_fields): Preservecisco_nexus.logfields that were copied to ECS fields. Default:false.Processors(processors): Define agent-side processing rules. Refer to Processors for details.
After configuring the input, click Save and continue to deploy the integration.
To verify that the integration is working and data is flowing, follow these steps:
- Trigger data flow on the Cisco Nexus device using one of the following methods:
- Configuration event: Enter and exit global configuration mode by running
configure terminalfollowed byexitto generate aSYS-5-CONFIG_Ilog message. - Interface event: Perform a
shutdownandno shutdowncommand on a test interface (for example,interface Ethernet1/1) to generate interface status change logs. - Authentication event: Log out of the current SSH session and log back in to generate an AAA/User login message.
- Configuration event: Enter and exit global configuration mode by running
- In Kibana, navigate to Analytics > Discover.
- Select the
logs-*data view. - Enter the following KQL filter in the search bar:
data_stream.dataset : "cisco_nexus.log" - Verify that logs appear in the results with recent timestamps. Expand a log entry and confirm the presence of these fields:
event.dataset(should becisco_nexus.log)source.ip(should match the management IP of the Nexus switch)event.code(the NX-OS mnemonic, for example,VSHD_SYSLOG_CONFIG_IorIF_UP)message(the raw log payload)
- Navigate to Analytics > Dashboards and search for "Cisco Nexus" to view the pre-built dashboards and confirm visualization of the events.
For help with Elastic ingest tools, check the Common problems documentation.
You can resolve common connectivity and parsing issues by following these troubleshooting steps:
- No data is being collected:
- Verify that the port specified in the integration (default
9506) isn't being used by another service on the Elastic Agent host. You can check for active listeners on Linux using a command likenetstat -ano | grep 9506. - Confirm that local firewalls on the Elastic Agent host, such as
iptablesorfirewalld, and network access control lists (ACLs) allow traffic on the configured TCP or UDP port. - Ensure the Cisco Nexus switch has a valid network path to the Elastic Agent IP address.
- Verify that the port specified in the integration (default
- Virtual Routing and Forwarding (VRF) configuration issues:
- On Cisco Nexus switches, logging often occurs over a specific VRF instance, such as the
managementVRF. If the switch can't reach the agent, ensure you've specified the correct VRF in the logging command. - Update the logging command on the switch to include the VRF, for example:
logging server <ELASTIC_AGENT_IP> 6 use-vrf management.
- On Cisco Nexus switches, logging often occurs over a specific VRF instance, such as the
- TCP connection failures:
- NX-OS doesn't support standard unencrypted TCP syslog. The
securekeyword is required on the switch to enable TLS-encrypted syslog, which typically uses port6514. - If you're using TCP, ensure you have configured SSL/TLS settings in the integration and that the switch is configured with the
secureparameter:logging server <ELASTIC_AGENT_IP> 6 port 6514 secure use-vrf <vrf_name>.
- NX-OS doesn't support standard unencrypted TCP syslog. The
- Timestamp and timezone parsing errors:
- If events appear with the wrong time or fail to parse, verify that the switch is configured for millisecond precision using the command
logging timestamp milliseconds. - Check the switch's system time and NTP synchronization settings.
- Use the
Timezone OffsetorTimezone Mapparameters in the integration settings to align the switch's local time with the Elastic Stack.
- If events appear with the wrong time or fail to parse, verify that the switch is configured for millisecond precision using the command
- Ingestion and field mapping errors:
- Check the
error.messagefield in Kibana Discover for specific details about parsing failures. - Verify the switch is using the standard NX-OS logging format, as custom log formats might not be compatible with the integration's processors.
- Avoid forwarding debug-level logs (level 7) unless necessary, as these can vary significantly in format and volume, potentially causing mapping issues.
- Check the
For more information about configuring and troubleshooting Cisco Nexus logging, refer to the following vendor documentation:
- Cisco Nexus 9000 Series NX-OS System Management Configuration Guide - Configuring System Message Logging
- Cisco Nexus Series Switches Support Home
- Cisco NX-OS System Message Guides
For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.
To ensure optimal performance in high-volume data center environments, you should consider the following configuration and deployment factors:
- While UDP's faster for syslog transmission, you should use TCP for Cisco Nexus logs in environments where you need delivery guarantees. TCP ensures you don't lose log messages due to network congestion, though it introduces slightly higher overhead on the switch's control plane.
- Configure your Cisco Nexus appliance to forward only necessary events by setting the
logging levelat the source. It's recommended to use level5(Notifications) or level6(Informational) for production monitoring. You should avoid forwarding debug-level logs (level7) unless you're troubleshooting specific issues, as they can significantly increase CPU load on the switch and ingest volume in the Elastic Stack. - For high-throughput environments with hundreds of switches, you can deploy multiple Elastic Agents behind a network load balancer to distribute the
logdata stream traffic evenly across instances. Place your agents close to the data source within the same management VRF to minimize latency and potential packet loss.
These inputs can be used with this integration:
filestream
For more details about the Filestream input settings, check the Filebeat documentation.
To collect logs via Filestream, select Collect logs via Filestream and configure the following parameters:
- Filestream paths: The full path to the related log file.
tcp
For more details about the TCP input settings, check the Filebeat documentation.
To collect logs via TCP, select Collect logs via TCP and configure the following parameters:
Required Settings:
- Host
- Port
Common Optional Settings:
- Max Message Size - Maximum size of incoming messages
- Max Connections - Maximum number of concurrent connections
- Timeout - How long to wait for data before closing idle connections
- Line Delimiter - Character(s) that separate log messages
To enable encrypted connections, configure the following SSL settings:
SSL Settings:
- Enable SSL - Toggle to enable SSL/TLS encryption
- Certificate - Path to the SSL certificate file (
.crtor.pem) - Certificate Key - Path to the private key file (
.key) - Certificate Authorities - Path to CA certificate file for client certificate validation (optional)
- Client Authentication - Require client certificates (
none,optional, orrequired) - Supported Protocols - TLS versions to support (e.g.,
TLSv1.2,TLSv1.3)
Example SSL Configuration:
ssl.enabled: true
ssl.certificate: "/path/to/server.crt"
ssl.key: "/path/to/server.key"
ssl.certificate_authorities: ["/path/to/ca.crt"]
ssl.client_authentication: "optional"
udp
For more details about the UDP input settings, check the Filebeat documentation.
To collect logs via UDP, select Collect logs via UDP and configure the following parameters:
Required Settings:
- Host
- Port
Common Optional Settings:
- Max Message Size - Maximum size of UDP packets to accept (default: 10KB, max: 64KB)
- Read Buffer - UDP socket read buffer size for handling bursts of messages
- Read Timeout - How long to wait for incoming packets before checking for shutdown
The Cisco Nexus integration includes the following data stream:
The log data stream collects system messages and operational logs from Cisco Nexus switches. These logs provide information about device status, configuration changes, interface states, and other network events handled by the NX-OS software.
The following fields are exported by this data stream:
Exported fields
| Field | Description | Type |
|---|---|---|
| @timestamp | Event timestamp. | date |
| cisco_nexus.log.command | keyword | |
| cisco_nexus.log.description | keyword | |
| cisco_nexus.log.euid | keyword | |
| cisco_nexus.log.facility | keyword | |
| cisco_nexus.log.interface.mode | keyword | |
| cisco_nexus.log.interface.name | keyword | |
| cisco_nexus.log.ip_address | ip | |
| cisco_nexus.log.line_protocol_state | keyword | |
| cisco_nexus.log.logname | keyword | |
| cisco_nexus.log.network.egress_interface | keyword | |
| cisco_nexus.log.network.ingress_interface | keyword | |
| cisco_nexus.log.operating_value | keyword | |
| cisco_nexus.log.operational.duplex_mode | keyword | |
| cisco_nexus.log.operational.receive_flow_control_state | keyword | |
| cisco_nexus.log.operational.speed | keyword | |
| cisco_nexus.log.operational.transmit_flow_control_state | keyword | |
| cisco_nexus.log.priority_number | long | |
| cisco_nexus.log.pwd | keyword | |
| cisco_nexus.log.rhost | keyword | |
| cisco_nexus.log.ruser | keyword | |
| cisco_nexus.log.sequence_number | long | |
| cisco_nexus.log.severity | long | |
| cisco_nexus.log.slot_number | long | |
| cisco_nexus.log.standby | keyword | |
| cisco_nexus.log.state | keyword | |
| cisco_nexus.log.switch_name | keyword | |
| cisco_nexus.log.syslog_time | date | |
| cisco_nexus.log.terminal | keyword | |
| cisco_nexus.log.threshold_value | keyword | |
| cisco_nexus.log.time | date | |
| cisco_nexus.log.timezone | keyword | |
| cisco_nexus.log.tty | keyword | |
| cisco_nexus.log.type | keyword | |
| cisco_nexus.log.uid | keyword | |
| data_stream.dataset | Data stream dataset. | constant_keyword |
| data_stream.namespace | Data stream namespace. | constant_keyword |
| data_stream.type | Data stream type. | constant_keyword |
| event.dataset | Event dataset. | constant_keyword |
| event.module | Event module. | constant_keyword |
| input.type | Type of Filebeat input. | keyword |
| log.file.device_id | ID of the device containing the filesystem where the file resides. | keyword |
| log.file.fingerprint | The sha256 fingerprint identity of the file when fingerprinting is enabled. | keyword |
| log.file.idxhi | The high-order part of a unique identifier that is associated with a file. (Windows-only) | keyword |
| log.file.idxlo | The low-order part of a unique identifier that is associated with a file. (Windows-only) | keyword |
| log.file.inode | Inode number of the log file. | keyword |
| log.file.vol | The serial number of the volume that contains a file. (Windows-only) | keyword |
| log.offset | Log offset. | long |
| log.source.address | Source address from which the log event was read / sent from. | keyword |
| tags | User defined tags. | keyword |
A sample event for this data stream is as follows:
Example
{
"@timestamp": "2023-04-26T09:08:48.000Z",
"agent": {
"ephemeral_id": "520a22ce-a7c9-4d1d-83df-a6abd00f7f74",
"id": "13671cfa-49ce-4139-8d65-90166401d5f5",
"name": "elastic-agent-83602",
"type": "filebeat",
"version": "9.0.3"
},
"cisco_nexus": {
"log": {
"description": "last message repeated 3 time",
"priority_number": 187,
"switch_name": "switchname",
"time": "2023-04-26T09:08:48.000Z",
"timezone": "UTC"
}
},
"data_stream": {
"dataset": "cisco_nexus.log",
"namespace": "90551",
"type": "logs"
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "13671cfa-49ce-4139-8d65-90166401d5f5",
"snapshot": false,
"version": "9.0.3"
},
"event": {
"agent_id_status": "verified",
"dataset": "cisco_nexus.log",
"ingested": "2025-07-11T13:14:05Z",
"kind": "event",
"module": "cisco_nexus",
"original": "<187>switchname: 2023 Apr 26 09:08:48 UTC: last message repeated 3 time",
"timezone": "UTC"
},
"input": {
"type": "tcp"
},
"log": {
"source": {
"address": "172.22.0.3:46916"
},
"syslog": {
"priority": 187
}
},
"message": "last message repeated 3 time",
"observer": {
"name": "switchname",
"product": "Nexus",
"type": "switches",
"vendor": "Cisco"
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"cisco_nexus-log"
]
}
You can find more information about Cisco Nexus logs and system messages in the following resources:
- Cisco Nexus Series Switches Support Home
- Cisco NX-OS System Message Guides
- Configuring System Message Logging
This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.
Changelog
| Version | Details | Minimum Kibana version |
|---|---|---|
| 1.6.0 | Enhancement (View pull request) Update documentation for the integration. |
9.0.0 8.11.0 |
| 1.5.0 | Enhancement (View pull request) Preserve event.original on pipeline error. |
9.0.0 8.11.0 |
| 1.4.4 | Enhancement (View pull request) Generate processor tags and normalize error handler. |
9.0.0 8.11.0 |
| 1.4.3 | Bug fix (View pull request) Fix whitespace issue with grok pattern. |
9.0.0 8.11.0 |
| 1.4.2 | Enhancement (View pull request) Changed owners. |
9.0.0 8.11.0 |
| 1.4.1 | Bug fix (View pull request) Fix bug that did not recognize timestamps to use tz_map override. |
9.0.0 8.11.0 |
| 1.4.0 | Enhancement (View pull request) Support stack version 9.0. |
9.0.0 8.11.0 |
| 1.3.1 | Bug fix (View pull request) Updated SSL description to be uniform and to include links to documentation. |
8.11.0 |
| 1.3.0 | Enhancement (View pull request) ECS version updated to 8.17.0. |
8.11.0 |
| 1.2.0 | Enhancement (View pull request) Allow @custom pipeline access to event.original without setting preserve_original_event. |
8.11.0 |
| 1.1.1 | Bug fix (View pull request) Fix ingest pipeline warnings |
8.7.0 |
| 1.1.0 | Enhancement (View pull request) Update package spec to 3.0.3. |
8.7.0 |
| 1.0.1 | Enhancement (View pull request) Changed owners |
8.7.0 |
| 1.0.0 | Enhancement (View pull request) Release package as GA. |
8.7.0 |
| 0.21.1 | Bug fix (View pull request) Fix exclude_files pattern. |
8.7.0 |
| 0.21.0 | Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.0 |
| 0.20.0 | Enhancement (View pull request) Improve 'event.original' check to avoid errors if set. |
8.7.0 |
| 0.19.0 | Enhancement (View pull request) Adapt fields for changes in file system info |
8.7.0 |
| 0.18.0 | Enhancement (View pull request) ECS version updated to 8.10.0. |
8.7.0 |
| 0.17.0 | Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest. |
8.7.0 |
| 0.16.0 | Enhancement (View pull request) Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.0 |
| 0.15.0 | Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.0 |
| 0.14.2 | Bug fix (View pull request) Remove confusing error message tag prefix. |
8.7.0 |
| 0.14.1 | Enhancement (View pull request) Add support for new log format. |
8.7.0 |
| 0.14.0 | Enhancement (View pull request) Ensure event.kind is correctly set for pipeline errors. |
8.7.0 |
| 0.13.0 | Enhancement (View pull request) Replace RSA2ELK with Syslog integration. |
8.7.0 |
| 0.12.0 | Enhancement (View pull request) Update package to ECS 8.8.0. |
8.0.0 7.16.0 |
| 0.11.0 | Enhancement (View pull request) Update package-spec version to 2.7.0. |
8.0.0 7.16.0 |
| 0.10.0 | Enhancement (View pull request) Update package to ECS 8.7.0. |
— |
| 0.9.0 | Enhancement (View pull request) Update package to ECS 8.6.0. |
— |
| 0.8.0 | Enhancement (View pull request) Update package to ECS 8.5.0. |
— |
| 0.7.3 | Bug fix (View pull request) Remove duplicate fields. |
— |
| 0.7.2 | Bug fix (View pull request) Remove duplicate field. |
— |
| 0.7.1 | Enhancement (View pull request) Use ECS geo.location definition. |
— |
| 0.7.0 | Enhancement (View pull request) Update package to ECS 8.4.0 |
— |
| 0.6.0 | Enhancement (View pull request) Update package to ECS 8.3.0. |
— |
| 0.5.1 | Enhancement (View pull request) Updated readme file |
— |
| 0.5.0 | Enhancement (View pull request) Update to ECS 8.2.0 |
— |
| 0.4.1 | Enhancement (View pull request) Add documentation for multi-fields |
— |
| 0.4.0 | Enhancement (View pull request) Update to ECS 8.0.0 |
— |
| 0.3.1 | Bug fix (View pull request) Regenerate test files using the new GeoIP database |
— |
| 0.3.0 | Enhancement (View pull request) Add 8.0.0 version constraint |
— |
| 0.2.3 | Enhancement (View pull request) Update Title and Description. |
— |
| 0.2.2 | Bug fix (View pull request) Fixed a bug that prevents the package from working in 7.16. |
— |
| 0.2.1 | Bug fix (View pull request) Fix logic that checks for the 'forwarded' tag |
— |
| 0.2.0 | Enhancement (View pull request) Update to ECS 1.12.0 |
— |
| 0.1.0 | Enhancement (View pull request) Initial implementation for splitting Cisco nexus from Cisco package |
— |