Appendixes

Appendix A: SR-SIM supported hardware

This appendix provides tables that list supported hardware for the following chassis types:

7250 IXR

The following tables list the default system layout and supported hardware for the 7250 IXR chassis type.

7250 IXR-6

Table 1. 7250 IXR-6 default system layout
7250 IXR-6 default system layout
Chassis Slot Recommended memory per container SFM Card MDA

IXR-6

A 6 GB

sfm-ixr-6

cpm-ixr

1

imm36-100g-qsfp28

Table 2. 7250 IXR-6 supported hardware
7250 IXR-6 supported hardware
Chassis SFM Card MDA

IXR-6

sfm-ixr-6

cpm-ixr

imm36-100g-qsfp28

m36-100g-qsfp28

imm48-sfp+2-qsfp28

m48-sfp+2-qsfp28

7250 IXR-10

Table 3. 7250 IXR-10 default system layout

7250 IXR-10 default system layout

Chassis Slot Recommended memory per container SFM Card MDA

IXR-10

A 4 GB

sfm-ixr-10

cpm-ixr

1 6 GB

imm36-100g-qsfp28

Table 4. 7250 IXR-10 supported hardware

7250 IXR-10 supported hardware

Chassis SFM Card MDA

IXR-10

sfm-ixr-10

cpm-ixr

imm36-100g-qsfp28

m36-100g-qsfp28

imm48-sfp+2-qsfp28

m48-sfp+2-qsfp28

7250 IXR-e

Table 5. 7250 IXR-e default system layout
7250 IXR-e default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-e

A 4 GB

cpm-ixr-e

1

imm24-sfp++8-sfp28+2-qsfp28

Table 6. 7250 IXR-e supported hardware
7250 IXR-e supported hardware
Chassis Card MDA

IXR-e

cpm-ixr-e/imm24-sfp++8-sfp28+2-qsfp28

cpm-ixr-e-gnss/imm24-sfp++8-sfp28+2-qsfp28

m24-sfp++8-sfp28+2-qsfp28 1

cpm-ixr-e/imm14-10g-sfp++4-1g-tx

cpm-ixr-e-gnss/imm14-10g-sfp++4-1g-tx

m14-10g-sfp++4-1g-tx 1

1 The MDA entry is not required on the CPM VM in slot A.

7250 IXR-e2

Table 7. 7250 IXR-e2 default system layout
7250 IXR-e2 default system layout
Chassis Slot Recommended memory per container Card

MDA

IXR-e2

A 4 GB

cpm-ixr-e2

Table 8. 7250 IXR-e2 supported hardware
7250 IXR-e2 supported hardware
Chassis Card

MDA

IXR-e2

cpm-ixr-e2

m2-qsfpdd+2-qsfp28+24-sfp28

7250 IXR-e2c

Table 9. 7250 IXR-e2c default system layout
7250 IXR-e2c default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-e2c

A 4 GB

cpm-ixr-e2c

Table 10. 7250 IXR-e2c supported hardware
7250 IXR-e2c supported hardware
Chassis Card MDA

IXR-e2c

cpm-ixr-e2c

m12-sfp28+2-qsfp28

7250 IXR-ec

Table 11. 7250 IXR-ec IXR-ec default system layout
7250 IXR-ec default system layout
Chassis Slot Recommended memory per container Card

MDA

IXR-ec

A 4 GB

cpm-ixr-ec

Table 12. 7250 IXR-ec supported hardware
7250 IXR-ec supported hardware
Chassis Card

MDA

IXR-ec

cpm-ixr-ec

m4-1g-tx+20-1g-sfp+6-10g-sfp+

7250 IXR-R4

Table 13. 7250 IXR-R4 default system layout
7250 IXR-R4 default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-R4

A 4 GB

cpm-ixr-r4

1

iom-ixr-r4

m6-10g-sfp++1-100g-qsfp28

Table 14. 7250 IXR-R4 supported hardware
7250 IXR-R4 supported hardware
Chassis Card MDA

IXR-R4

cpm-ixr-r4

iom-ixr-r4

m6-10g-sfp++1-100g-qsfp28

m20-1g-csfp 1

m10-10g-sfp+

m4-10g-sfp++1-100g-cfp2

m6-10g-sfp++4-25g-sfp28

m10-1g-sfp+2-10g-sfp+ 2

1 This MDA must use slots 1, 2, or 3.
2 The integrated MDA must be specified as mda/5.

7250 IXR-R6

Table 15. 7250 IXR-R6 default system layout
7250 IXR-R6 default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-R6

A 6 GB

cpiom-ixr-r6

m6-10g-sfp++1-100g-qsfp28

Table 16. 7250 IXR-R6 supported hardware
7250 IXR-R6 supported hardware
Chassis Card MDA

IXR-R6

cpiom-ixr-r6

a32-chds1v2 1

m4-10g-sfp++1-100g-cfp2

m6-10g-sfp++1-100g-qsfp28

m6-10g-sfp++4-25g-sfp28

m10-10g-sfp+

m20-1g-csfp 2

1 This MDA has slot restrictions for slot 5 or 6.
2 This MDA must use either slot 3 or 4.

7250 IXR-R6d

Table 17. 7250 IXR-R6d default system layout
7250 IXR-R6d default system layout
Chassis Slot Recommended memory per container Card

MDA

IXR-R6d

A 4 GB

cpm-ixr-r6d

1

iom-ixr-r6d

m1-400g-qsfpdd+1-100g-qsfp28

Table 18. 7250 IXR-R6d supported hardware
7250 IXR-R6d supported hardware
Chassis Card

MDA

IXR-R6d

cpm-ixr-r6d/iom-ixr-r6d

m1-400g-qsfpdd+1-100g-qsfp28 1

m5-100g-qsfp28 1

m18-25g-sfp281

m2-cfp21

m20-10g-sfp+1

m10-50g-sfp561

m32-1g-csfp1

m2-100g-qsfp28+16-10g-sfp+1

7250 IXR-R6dl

Table 19. 7250 IXR-R6dl default system layout
7250 IXR-R6dl default system layout
Chassis Slot Recommended memory per container Card

MDA

IXR-R6dl

A 4 GB

cpm-ixr-r6d

1

iom-ixr-r6d

m1-400g-qsfpdd+1-100g-qsfp28

Table 20. 7250 IXR-R6dl supported hardware
7250 IXR-R6dl supported hardware
Chassis Card

MDA

IXR-R6dl

cpm-ixr-r6d/iom-ixr-r6d

m1-400g-qsfpdd+1-100g-qsfp28 1

m5-100g-qsfp28 1

m18-25g-sfp281

m2-cfp21

m20-10g-sfp+1

m10-50g-sfp561

m46-10g-sfp+1

m32-1g-csfp1

m80-1g-csfp1

m2-100g-qsfp28+16-10g-sfp+1

7250 IXR-s

Table 21. 7250 IXR-s default system layout
7250 IXR-s default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-s

A 4 GB

cpm-ixr-s/imm48-sfp++6-qsfp28

1

cpm-ixr-s/imm48-sfp++6-qsfp28

Table 22. 7250 IXR-s supported hardware
7250 IXR-s supported hardware
Chassis Card MDA

IXR-s

cpm-ixr-s/imm48-sfp++6-qsfp28

m48-sfp++6-qsfp28 1

7250 IXR-X

Table 23. 7250 IXR-X default system layout
7250 IXR-X default system layout
Chassis Slot Recommended memory per container Card MDA

IXR-X

A 4 GB

cpm-ixr-x

1

imm6-qsfpdd+48-sfp56

Table 24. 7250 IXR-X supported hardware

7250 IXR-X supported hardware

Chassis Card MDA

IXR-X

cpm-ixr-x/imm32-qsfp28+4-qsfpdd

m32-qsfp28+4-qsfpdd 1

cpm-ixr-x/imm6-qsfpdd+48-sfp56

m6-qsfpdd+48-sfp56 1

7250 IXR-X3

Table 25. 7250 IXR-X3 default system layout
7250 IXR-X3 default system layout
Chassis Slot Recommended memory per container Card

MDA

IXR-X3

A 6 GB

cpm-ixr-x

1

imm36-qsfpdd

Table 26. 7250 IXR-X3 supported hardware
7250 IXR-X3 supported hardware
Chassis Card

MDA

IXR-X3

cpm-ixr-x/imm36-qsfpdd

m36-qsfpdd 1

7450 ESS

The following tables list the default system layout and supported hardware for the 7450 ESS chassis type.

7450 ESS-7

Table 27. 7450 ESS-7 default system layout
7450 ESS-7 default system layout
Chassis Slot Recommended memory per container SFM Card MDA

ESS-7

A 4 GB

m-sfm6-7/12

cpm5

1

iom5-e

me6-100gb-qsfp28

Table 28. 7450 ESS-7 supported hardware
7450 ESS-7 supported hardware
Chassis SFM Card MDA

ESS-7

m-sfm6-7/12

cpm5

iom5-e

me6-100gb-qsfp28

7450 ESS-12

Table 29. 7450 ESS-12 default system layout
7450 ESS-12 default system layout
Chassis Slot Recommended memory per container SFM Card MDA

ESS-12

A 4 GB

m-sfm6-7/12

cpm5

1

iom5-e

me6-100gb-qsfp28

Table 30. 7450 ESS-12 supported hardware
7450 ESS-12 supported hardware
Chassis SFM Card MDA

ESS-12

m-sfm6-7/12

cpm5

iom5-e

me6-100gb-qsfp28

7705 SAR

The following tables list the default system layout and supported hardware for the 7705 SAR chassis type.

7705 SAR-Hm

Table 31. 7705 SAR-Hm default system layout
7705 SAR-Hm default system layout
Chassis Slot Recommended memory per container Card MDA/1 MDA/ 2 MDA/ 3 MDA/ 4 MDA/ 5 MDA/ 6

SAR-Hm

A 4 GB

cpm-sar-hm

i2-cellular

i6-10/100eth-tx

i2-sdi

i1-wlan

isa-ms-v

isa-ms-v

Table 32. 7705 SAR-Hm supported hardware
7705 SAR-Hm supported hardware
Chassis Card MDA

7705 SAR-Hm

cpm-sar-hm

i2-cellular

i6-10/100eth-tx

i2-sdi

i1-wlan

isa-ms-v

7705 SAR-Hmc

Table 33. 7705 SAR-Hmc default system layout
7705 SAR-Hmc default system layout
Chassis Slot Recommended memory per container Card MDA/1 MDA/2 MDA/3 MDA/4 MDA/5 MDA/6

SAR-Hmc

A 4 GB

cpm-sar-hmc

i2-cellular

i3-10/100eth-tx

i2-sdi

isa-ms-v

isa-ms-v

Table 34. 7705 SAR-Hmc supported hardware
7705 SAR-Hmc supported hardware
Chassis Card MDA

7705 SAR-Hmc

cpm-sar-hmc

i2-cellular

i3-10/100eth-tx

i2-sdi

isa-ms-v

isa-ms-v

7705 SAR Gen 2

The following tables list the default system layout and supported hardware for the 7705 SAR Gen 2 chassis type.

7705 SAR-1

Table 35. 7705 SAR-1 default system layout
7705 SAR-1 default system layout
Chassis Slot Recommended memory per container Card MDA/1 MDA/ 2 MDA/ 3

SAR-1

A 6 GB

iom-sar

m10-sfp++6-sfp

isa-ms-v

isa-ms-v

Table 36. 7705 SAR-1 supported hardware
7705 SAR-1 supported hardware
Chassis Card MDA

7705 SAR-1

iom-sar

m10-sfp++6-sfp (Fixed in MDA/1)

isa-ms-v (Fixed in MDA/2 and MDA/3)

7750 DMS

The following tables list the default system layout and supported hardware for the 7750 DMS chassis type.

7750 DMS-1-24D

Table 37. 7750 DMS-1-24D default system layout
7750 DMS-1-24D default system layout
Chassis Slot Recommended memory per container Card MDA

DMS-1-24D

A 4 GB

cpm-1x/dms24-800g-qsfpdd-1

1

d24-800g-qsfpdd-1

Table 38. 7750 DMS-1-24D supported hardware
7750 DMS-1-24D supported hardware
Chassis Card MDA

DMS-1-24D

cpm-1x/dms24-800g-qsfpdd-1

d24-800g-qsfpdd-1

7750 SR

The following tables list the default system layout and supported hardware for the 7750 SR chassis type.

7750 SR-1

Table 39. 7750 SR-1 default system layout
7750 SR-1 default system layout
Chassis Slot Recommended memory per container Card MDA/1 MDA/ 2

SR-1

A 4 GB

cpm-1

me6-100gb-qsfp28

me12-100gb-qsfp28
Table 40. 7750 SR-1 supported hardware
7750 SR-1 supported hardware
Chassis Card MDA

SR-1

cpm-1

me12-100gb-qsfp28

me3-200gb-cfp2-dco

me6-100gb-qsfp28

me6-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp28

me3-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp-b

7750 SR-1-24D

Table 41. 7750 SR-1-24D default system layout
7750 SR-1-24D default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1-24D

A 4 GB

cpm-1x/i24-800g-qsfpdd-1

1

cpm-1x/i24-800g-qsfpdd-1

Table 42. 7750 SR-1-24D supported hardware
7750 SR-1-24D supported hardware
Chassis Card MDA

SR-1-24D

cpm-1x/i24-800g-qsfpdd-1

m24-800g-qsfpdd-11

7750 SR-1-46S

Table 43. 7750 SR-1-46S default system layout
7750 SR-1-46S default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1-46S

A 4 GB

cpm-1x/i40-200g-sfpdd+6-800g-qsfpdd-1

1

cpm-1x/i40-200g-sfpdd+6-800g-qsfpdd-1

Table 44. 7750 SR-1-46S supported hardware
7750 SR-1-46S supported hardware
Chassis Card MDA

SR-1-46S

cpm-1x/i40-200g-sfpdd+6-800g-qsfpdd-1

m40-200g-sfpdd+6-800g-qsfpdd-11

7750 SR-1-48D

Table 45. 7750 SR-1-48D default system layout
7750 SR-1-48D default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1-48D

A 4 GB

cpm-1x/i48-400g-qsfpdd-1

1

cpm-1x/i48-400g-qsfpdd-1

Table 46. 7750 SR-1-48D supported hardware
7750 SR-1-48D supported hardware
Chassis Card MDA

SR-1-48D

cpm-1x/i48-400g-qsfpdd-1

m48-400g-qsfpdd-11

7750 SR-1-92S

Table 47. 7750 SR-1-92S default system layout
7750 SR-1-92S default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1-92S

A 4 GB

cpm-1x/i80-200g-sfpdd+12-400g-qsfpdd-1

1

cpm-1x/i80-200g-sfpdd+12-400g-qsfpdd-1

Table 48. 7750 SR-1-92S supported hardware
7750 SR-1-92S supported hardware
Chassis Card MDA

SR-1-92S

cpm-1x/i80-200g-sfpdd+12-400g-qsfpdd-1

m80-200g-sfpdd+12-400g-qsfpdd-11

7750 SR-1e/2e/3e

Table 49. 7750 SR-1e default system layout
7750 SR-1e default system layout
Chassis Slot Recommended memory per container Card MDA/ 1 MDA/ 2 MDA/ 3 MDA/ 4

SR-1e

A 4 GB

cpm-e

1

iom-e

me1-100gb-cfp2

me10-10gb-sfp+

me6-10gb-sfp+

isa2-aa

Table 50. 7750 SR-2e default system layout
7750 SR-2e default system layout
Chassis Slot Recommended memory per container Card MDA

SR-2e

A 4 GB

cpm-e

1

iom-e

me10-10gb-sfp+

Table 51. 7750 SR-3e default system layout
7750 SR-3e default system layout
Chassis Slot Recommended memory per container Card MDA

SR-3e

A 4 GB

cpm-e

1

ION: iom-e

me1-100gb-cfp2

Table 52. 7750 SR-1e/2e/3e supported hardware
7750 SR-1e/2e/3e supported hardware
Chassis Card MDA

SR-1e

SR-2e

SR-3e

cpm-e

iom-e

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

7750 SR-1s

Table 53. 7750 SR-1s default system layout
7750 SR-1s default system layout
Chassis Slot Recommended memory per container Card XIOM MDA

SR-1s

A 6 GB

cpm-1s

s36-100gb-qsfp28

Table 54. 7750 SR-1s supported hardware
7750 SR-1s supported hardware
Chassis Card XIOM MDA

SR-1s

cpm-1s

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms18-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

7750 SR-1se

Table 55. 7750 SR-1se default system layout
7750 SR-1se default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1se

A 6 GB

cpm-1se/imm36-800g-qsfpdd

1

cpm-1se/imm36-800g-qsfpdd

Table 56. 7750 SR-1se supported hardware
7750 SR-1se supported hardware
Chassis Card MDA

SR-1se

cpm-1se/imm36-800g-qsfpdd

ms36-800g-qsfpdd1

7750 SR-1x-48D

Table 57. 7750 SR-1x-48D default system layout
7750 SR-1x-48D default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1x-48D

A 4 GB

cpm-1x/i48-800g-qsfpdd-1x

1

cpm-1x/i48-800g-qsfpdd-1x

Table 58. 7750 SR-1x-48D supported hardware
7750 SR-1x-48D supported hardware
Chassis Card MDA

SR-1x-48D

cpm-1x/i48-800g-qsfpdd-1x

m48-800g-qsfpdd-1x1

7750 SR-1x-92S

Table 59. 7750 SR-1x-92S default system layout
7750 SR-1x-92S default system layout
Chassis Slot Recommended memory per container Card MDA

SR-1x-92S

A 4 GB

cpm-1x/i80-200g-sfpdd+12-800g-qsfpdd-1x

1

cpm-1x/i80-200g-sfpdd+12-800g-qsfpdd-1x

Table 60. 7750 SR-1x-92S supported hardware
7750 SR-1x-92S supported hardware
Chassis Card MDA

SR-1x-92S

cpm-1x/i80-200g-sfpdd+12-800g-qsfpdd-1x

m80-200g-sfpdd+12-800g-qsfpdd-1x1

7750 SR-2s

Table 61. 7750 SR-2s default system layout
7750 SR-2s default system layout
Chassis Slot Recommended memory per container SFM Card XIOM MDA

SR-2s

A 6 GB

sfm-2s

cpm-2s

1

xcm-2s mda/1=s36-100gb-qsfp28

Table 62. 7750 SR-2s supported hardware
7750 SR-2s supported hardware
SFM Card XIOM MDA

SR-2s

sfm-2s

cpm-2s

xcm-2s

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-1.5t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms18-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

7750 SR-2se

Table 63. 7750 SR-2se default system layout
7750 SR-2se default system layout
Chassis Slot Recommended memory per container SFM Card XIOM MDA

SR-2se

A 8 GB

sfm-2se

cpm-2se

1

xcm-2se

me6-100gb-qsfp28

Table 64. 7750 SR-2se supported hardware
7750 SR-2se supported hardware
Chassis SFM Card XIOM MDA

SR-2se

sfm-2se

cpm-2se

xcm-2se

x2-s36-800g-qsfpdd-18.0t

x2-s36-800g-qsfpdd-12.0t

iom2-se-3.0t

iom2-se-6.0t

mse24-200g-sfpdd

mse14-800g+4-400g

mse6-800g-qsfpdd

mse6-800g-cfp2-dco

x2-s36-800g-qsfpdd-6.0t

m36-800g-qsfpdd

x2-s36-400g-qsfp112-3.0t

m36-400g-qsfp112

xcmc-2se

iom2-se-3.0t

iom2-se-6.0t

mse24-200g-sfpdd

mse14-800g+4-400g

mse6-800g-qsfpdd

mse6-800g-cfp2-dco

x2-s36-800g-qsfpdd-6.0t

m36-800g-qsfpdd

x2-s36-400g-qsfp112-3.0t

m36-400g-qsfp112

7750 SR-7

Table 65. 7750 SR-7 default system layout
7750 SR-7 default system layout
Chassis Slot Recommended memory per container SFM Card MDA

SR-7

A 4 GB

m-sfm6-7/12

cpm5

1

iom5-e

me6-100gb-qsfp28

Table 66. 7750 SR-7 supported hardware
7750 SR-7 supported hardware
Chassis SFM Card MDA

SR-7

m-sfm5-7 or m-sfm6-7/12

cpm5

m-sfm5-7 or m-sfm6-7/12

imm-2pac-fp3

isa2-aa

isa2-bb

isa2-tunnel

p10-10g-sfp

p1-100g-cfp

m-sfm5-7 or m-sfm6-7/12

imm48-1gb-sfp-c

imm24-1gb-xp-sfp

m-sfm5-7 or m-sfm6-7/12

iom4-e

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-7 or m-sfm6-7/12

iom4-e-b

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-12 or m-sfm6-7/12

iom4-e-hs

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm6-7/12

iom5-e

me3-200gb-cfp2-dco

me6-100gb-qsfp28

me16-25gb-sfp28+2-100gb-qsfp28

me3-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp-b

7750 SR-7s

Table 67. 7750 SR-7s default system layout
7750 SR-7s default system layout
Chassis Slot Recommended memory per container SFM Card XIOM MDA

SR-7s

A 4 GB

sfm2-s

cpm2-s

1 6 GB

xcm2-7s

x2-s36-800g-qsfpdd-18.0t

Table 68. 7750 SR-7s supported hardware
7750 SR-7s supported hardware
Chassis SFM Card XIOM MDA

SR-7s

sfm-s

cpm-s

cpm2-s

xcm-7s

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-1.5t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms18-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

sfm2-s

cpm2-s

xcm2-7s

x2-s36-800g-qsfpdd-18.0t

x2-s36-800g-qsfpdd-12.0t

iom2-se-3.0t

iom2-se-6.0t

mse24-200g-sfpdd

mse14-800g+4-400g

mse6-800g-qsfpdd

mse6-800g-cfp2-dco

x2-s36-800g-qsfpdd-6.0t

m36-800g-qsfpdd

x2-s36-400g-qsfp112-3.0t

m36-400g-qsfp112

xcm-7s-b

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-1.5t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms18-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

7750 SR-12

Table 69. 7750 SR-12 default system layout
7750 SR-12 default system layout
Chassis Slot Recommended memory per container SFM Card MDA

SR-12

A 4 GB

m-sfm6-7/12

cpm5

1

iom5-e

me6-100gb-qsfp28

Table 70. 7750 SR-12 supported hardware
7750 SR-12 supported hardware
Chassis SFM Card MDA

SR-12

m-sfm5-12 or m-sfm6-7/12

cpm5

m-sfm5-12 or m-sfm6-7/12

imm-2pac-fp3

isa2-aa

isa2-bb

isa2-tunnel

p10-10g-sfp

p1-100g-cfp

m-sfm5-12 or m-sfm6-7/12

imm48-1gb-sfp-c

imm24-1gb-xp-sfp

m-sfm5-12 or m-sfm6-7/12

iom4-e

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-12 or m-sfm6-7/12

iom4-e-b

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-12 or m-sfm6-7/12

iom4-e-hs

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm6-7/12

iom5-e

me3-200gb-cfp2-dco

me6-100gb-qsfp28

me16-25gb-sfp28+2-100gb-qsfp28

me3-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp-b

7750 SR-12e

Table 71. 7750 SR-12e default system layout
7750 SR-12e default system layout
Chassis Slot Recommended memory per container SFM Card MDA

SR-12e

A 4 GB

m-sfm6-12e

cpm5

1

iom5-e

me6-100gb-qsfp28

Table 72. 7750 SR-12e supported hardware
7750 SR-12e supported hardware
Chassis SFM Card MDA

SR-12e

m-sfm5-12e or m-sfm6-12e

cpm5

m-sfm5-12e or m-sfm6-12e

imm-2pac-fp3

isa2-aa

isa2-bb

isa2-tunnel

p10-10g-sfp

p1-100g-cfp

m-sfm5-12e or m-sfm6-12e

imm40-10gb-sfp

m40-10g-sfp

m-sfm5-12e or m-sfm6-12e

imm4-100gb-cfp4

m4-100g-cfp4

m-sfm5-12e or m-sfm6-12e

iom4-e

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-12e or m-sfm6-12e

iom4-e-b

isa2-aa

isa2-bb

isa2-tunnel

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm5-12e or m-sfm6-12e

iom4-e-hs

me10-10gb-sfp+

me1-100gb-cfp2

me12-10/1gb-sfp+

me2-100gb-cfp4

me2-100gb-ms-qsfp28

me2-100gb-qsfp28

me40-1gb-csfp

me6-10gb-sfp+

me8-10/25gb-sfp28

m-sfm6-12e

iom5-e

me12-100gb-qsfp28

me3-200gb-cfp2-dco

me6-100gb-qsfp28

me6-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp28

me3-400gb-qsfpdd

me16-25gb-sfp28+2-100gb-qsfp-b

7750 SR-14s

Table 73. 7750 SR-14s default system layout
7750 SR-14s default system layout
Chassis Slot Recommended memory per container SFM Card XIOM MDA

SR-14s

A 4 GB

sfm2-s

cpm2-s

1 8 GB

xcm2-14s

x2-s36-800g-qsfpdd-18.0t

Table 74. 7750 SR-14s supported hardware
7750 SR-14s supported hardware
Chassis SFM Card XIOM MDA

SR-14s

sfm-s

cpm-s

cpm2-s

xcm-14s

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-1.5t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms18-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

sfm2-s

cpm2-s

xcm2-14s

x2-s36-800g-qsfpdd-18.0t

x2-s36-800g-qsfpdd-12.0t

iom2-se-3.0t

iom2-se-6.0t

mse24-200g-sfpdd

mse14-800g+4-400g

mse6-800g-qsfpdd

mse6-800g-cfp2-dco

x2-s36-800g-qsfpdd-6.0t

m36-800g-qsfpdd

x2-s36-400g-qsfp112-3.0t

m36-400g-qsfp112

xcm-14s-b

s18-100gb-qsfp28

s36-100gb-qsfp28

s36-400gb-qsfpdd

s36-100gb-qsfp28-3.6t

iom-s-1.5t

iom-s-3.0t

ms2-400gb-qsfpdd+2-100gb-qsfp28

ms3-200gb-cfp2-dco

ms4-400gb-qsfpdd+4-100gb-qsfp28

ms6-300gb-cfp2-dco

ms8-100gb-sfpdd+2-100gb-qsfp28

ms16-100gb-sfpdd+4-100gb-qsfp28

ms18-100gb-qsfp28

ms24-10/100gb-sfpdd

ms16-sdd+4-qsfp28-b

ms8-sdd+2-qsfp28-b

7750 SR-a4/a8

Table 75. 7750 SR-a4 default system layout
7750 SR-a4 default system layout
Chassis Slot Recommended memory per container Card MDA/ 1 MDA/ 2 MDA/ 3 MDA/ 4

SR-a4

A 4 GB

cpm-a

1

iom-a

maxp1-100gb-cfp

ma44-1gb-csfp

maxp10-10gb-sfp+

ma2-10gb-sfp+12-1gb-sfp

Table 76. 7750 SR-a8 default system layout
7750 SR-a8 default system layout
Chassis Slot Recommended memory per container Card MDA

SR-a8

A 4 GB

cpm-a

1

iom-a

maxp1-100gb-cfp

Table 77. 7750 SR-a4/a8 supported hardware
7750 SR-a4/a8 supported hardware
Chassis Card MDA

SR-a4

SR-a8

cpm-a

iom-a

ma20-1gb-tx

ma2-10gb-sfp+12-1gb-sfp

ma4-10gb-sfp+

ma44-1gb-csfp

maxp10-10/1gb-msec-sfp+

maxp10-10gb-sfp+

maxp1-100gb-cfp

maxp1-100gb-cfp2

maxp1-100gb-cfp4

maxp6-10gb-sfp+1-40gb-qsfp+

7950 XRS

The following tables list the default system layout and supported hardware for the 7950 XRS chassis type.

7950 XRS-20/20e

Table 78. 7950 XRS-20/20e default system layout
7950 XRS-20/20e default system layout
Chassis Slot Recommended memory per container SFM Card MDA

XRS-20

XRS-20e

A 4 GB

sfm2-x20s

cpm2-x20

1

xcm2-x20

x24-100g-qsfp28

Table 79. 7950 XRS-20/20e supported hardware
7950 XRS-20/20e supported hardware
Chassis SFM Card MDA

XRS-20

XRS-20e

sfm-x20

or

sfm-x20-b

or

sfm-x20s-b

cpm-x20

sfm2-x20s

cpm-x20

cpm2-x20

sfm-x20

xcm-x20

x2-100g-tun

sfm-x20-b

or

sfm-x20s-b

or

sfm2-x20s

xcm-x20

x2-100g-tun

x40-10g-sfp

x4-100g-cfp2

sfm2-x20s

xcm2-x20

x12-400g-qsfpdd

x24-100g-qsfp28

x6-200g-cfp2-dco

x6-400g-cfp8

VSR

The following tables list the default system layout and supported hardware for the VSR chassis type.

VSR-I (VSR Integrated mode)

Table 80. VSR-I (VSR Integrated mode) default system layout
VSR-I (VSR Integrated mode) default system layout
Chassis Slot Recommended memory per container Card MDA

VSR-I

A 8 GB

cpm-v/iom-v

m20-v

Table 81. VSR-I (VSR Integrated mode) supported hardware
VSR-I (VSR Integrated mode) supported hardware
Chassis Card MDA

VSR-I

cpm-v/iom-v

m20-v

Appendix B: Known limitations

The SR-SIM has the following limitations (this is not an exhaustive list):

  • The SR-SIM is designed to replicate control and management plane operations, and port throughput is limited to 1000 pps/port as a result. However, overall throughput is dependent on the resources allocated.
  • The control-plane performance is restricted.
  • The filesystem on the SR-SIM is case-sensitive.
  • In-Service software upgrade (ISSU) is not supported.

Appendix C: Example Kubernetes configuration using k3s on Ubuntu 24.04

Prerequisites

Ensure all host interfaces are configured with an MTU of 9000 before installation.

Install k3s

Replace <my_secret_token> in the following command with a private key specific to your installation.

curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC="server" sh -s - --agent-token <my_secret_token> --write-kubeconfig-mode "0666"

The --write-kubeconfig-mode "0666" flag is optional, allowing non-root users to issue kubectl deployment commands.

Ensuring the cni0 interface is set to an increased MTU

Issue the following command.

ifconfig cni0

The output should look similar to this.

cni0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 8950
        inet 10.42.0.1  netmask 255.255.255.0  broadcast 10.42.0.255
        inet6 fe80::181f:44ff:fe3f:484d  prefixlen 64  scopeid 0x20<link>
        ether 1a:1f:44:3f:48:4d  txqueuelen 1000  (Ethernet)
        RX packets 89118  bytes 687051420 (687.0 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 104066  bytes 697894863 (697.8 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Ensuring the flannel.1 interface is set to an increased MTU

Issue the following command.

ifconfig flannel.1

The output should look similar to this.

flannel.1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 8950
        inet 10.42.0.0  netmask 255.255.255.255  broadcast 0.0.0.0
        inet6 fe80::7415:7cff:fe68:a94e  prefixlen 64  scopeid 0x20<link>
        ether 76:15:7c:68:a9:4e  txqueuelen 0  (Ethernet)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 7 overruns 0  carrier 0  collisions 0

If the MTU on the flannel.1 interface is still set to a lower MTU, you can edit the /etc/systemd/system/k3s.service file to ensure the system is started based on the cni0 interface (which has a larger MTU) replacing this line:

ExecStart=/usr/local/bin/k3s \
    server \
        '--agent-token' \
        '<my_secret_token>' \
        '--write-kubeconfig-mode' \
        '0666' \

With this:

ExecStart=/usr/local/bin/k3s \
    server \
        '--agent-token' \
        '<my_secret_token>' \
        '--write-kubeconfig-mode' \
        '0666' \
        '--flannel-iface' \
        'cni0' \

Now restart the k3s daemon.

sudo systemctl daemon-reload
sudo systemctl restart k3s

Ensuring transmit checksum offloading is disabled for the cni0 interface

Issue the following command.

sudo ethtool -K cni0 tx-checksum-ip-generic off

Create aliases for kubectl

Create the following aliases in your shell. If you are using Bash, add the following lines to the ~/.bash_aliases file.

alias kubectl="k3s kubectl"
alias k="kubectl"

Then reread the file by issuing the following command.

source ~/.bash_aliases

Install a private container registry

Create the following files in a new directory dedicated to this purpose. Call it container-registry.

container-registry-ns.yml

apiVersion: v1
kind: Namespace
metadata:
  labels:
    kubernetes.io/metadata.name: container-registry
  name: container-registry
spec:

container-registry-pvc.yml

apiVersion: v1
kind: PersistentVolumeClaim
metadata:
  name: registry-claim
  labels:
    app: container-registry
spec:
  accessModes:
    - ReadWriteOnce
  storageClassName: local-path
  resources:
    requests:
      storage: 10Gi

container-registry-deployment.yml

apiVersion: apps/v1
kind: Deployment
metadata:
  annotations:
    deployment.kubernetes.io/revision: "1"
  labels:
    app: registry
  name: registry
  namespace: container-registry
spec:
  progressDeadlineSeconds: 600
  replicas: 1
  revisionHistoryLimit: 10
  selector:
    matchLabels:
      app: registry
  strategy:
    rollingUpdate:
      maxSurge: 25%
      maxUnavailable: 25%
    type: RollingUpdate
  template:
    metadata:
      creationTimestamp: null
      labels:
        app: registry
    spec:
      containers:
      - env:
        - name: REGISTRY_HTTP_ADDR
          value: :5000
        - name: REGISTRY_STORAGE_FILESYSTEM_ROOTDIRECTORY
          value: /var/lib/registry
        - name: REGISTRY_STORAGE_DELETE_ENABLED
          value: "yes"
        image: registry:2.8.1
        imagePullPolicy: IfNotPresent
        name: registry
        ports:
        - containerPort: 5000
          name: registry
          protocol: TCP
        resources: {}
        terminationMessagePath: /dev/termination-log
        terminationMessagePolicy: File
        volumeMounts:
        - mountPath: /var/lib/registry
          name: registry-data
      dnsPolicy: ClusterFirst
      restartPolicy: Always
      schedulerName: default-scheduler
      securityContext: {}
      terminationGracePeriodSeconds: 30
      volumes:
      - name: registry-data
        persistentVolumeClaim:
          claimName: registry-claim

container-registry-service.yml

apiVersion: v1
kind: Service
metadata:
  annotations:
  labels:
    app: registry
  name: registry
  namespace: container-registry
spec:
  externalTrafficPolicy: Cluster
  internalTrafficPolicy: Cluster
  ipFamilies:
  - IPv4
  ipFamilyPolicy: SingleStack
  ports:
  - name: registry
    port: 32000
    protocol: TCP
    targetPort: 5000
  selector:
    app: registry
  sessionAffinity: None
  type: LoadBalancer

kustomization.yml

namespace: container-registry
resources:
  - container-registry-ns.yml
  - container-registry-deployment.yml
  - container-registry-service.yml
  - container-registry-pvc.yml

From the same directory, issue the following command to deploy the container registry.

kubectl apply -k .

If it deploys correctly, you should see output similar to the following when the kubectl get all -n container-registry command is issued.

NAME                            READY   STATUS    RESTARTS   AGE
pod/registry-579865c76c-75p5z   1/1     Running   0          15m

NAME               TYPE           CLUSTER-IP     EXTERNAL-IP                     PORT(S)           AGE
service/registry   LoadBalancer   10.43.225.17   192.168.184.52,192.168.184.53   32000:31650/TCP   15m

NAME                       READY   UP-TO-DATE   AVAILABLE   AGE
deployment.apps/registry   1/1     1            1           15m

NAME                                  DESIRED   CURRENT   READY   AGE
replicaset.apps/registry-579865c76c   1         1         1       15m

Install the Multus CNI

Install the Multus CNI, which provides the ability to add multiple interfaces to a container.

Create the following file in a different directory from the container-registry directory.

multus-k3s.yml

apiVersion: helm.cattle.io/v1
kind: HelmChart
metadata:
  name: multus
  namespace: kube-system
spec:
  repo: https://rke2-charts.rancher.io
  chart: rke2-multus
  targetNamespace: kube-system
  valuesContent: |-
    config:
      fullnameOverride: multus
      cni_conf:
        confDir: /var/lib/rancher/k3s/agent/etc/cni/net.d
        binDir: /var/lib/rancher/k3s/data/cni/
        kubeconfig: /var/lib/rancher/k3s/agent/etc/cni/net.d/multus.d/multus.kubeconfig

Deploy this manifest to the Kubernetes cluster using the following command.

kubectl apply -f multus-k3s.yml

If it deploys correctly, you should see output similar to the following when the kubectl get all -n kube-system --show-labels -l app=rke2-multus command is issued.

NAME               READY   STATUS    RESTARTS   AGE   LABELS
pod/multus-lmd8n   1/1     Running   0          74m   app=rke2-multus,controller-revision-hash=7f7588f4bd,pod-template-generation=1,tier=node

NAME                    DESIRED   CURRENT   READY   UP-TO-DATE   AVAILABLE   NODE SELECTOR            AGE   LABELS
daemonset.apps/multus   1         1         1       1            1           kubernetes.io/os=linux   74m   app.kubernetes.io/managed-by=Helm,app=rke2-multus,tier=node

Appendix D: Example OpenShift manifests

Detailed deployment instructions are not provided for OpenShift; however, this appendix provides some example manifest files that may assist when crafting your own deployment.

Security Context Constraints (SCC)

scc.yml file contents

apiVersion: security.openshift.io/v1
kind: SecurityContextConstraints
  metadata:
name: srsim-scc
allowedUnsafeSysctls:
  - net.ipv4.conf.all.rp_filter
  - net.ipv4.conf.default.rp_filter
  - net.ipv6.conf.all.accept_ra
  - net.ipv6.conf.default.accept_ra
allowHostDirVolumePlugin: true
allowPrivilegeEscalation: true
allowPrivilegedContainer: false
allowedCapabilities:
  - CHOWN
  - IPC_LOCK
  - NET_ADMIN
  - NET_RAW
  - SYS_CHROOT
  - SYS_RESOURCE
  - SYS_TIME
  - NET_BIND_SERVICE
runAsUser:
  type: MustRunAsNonRoot
seLinuxContext:
  type: RunAsAny
seccompProfiles:
  - runtime/default
volumes:
  - nfs
  - hostPath
  - configMap
  - emptyDir
  - persistentVolumeClaim
  - project
  - secret
  - downwardAPI

nad.yml file contents

apiVersion: "k8s.cni.cncf.io/v1"
kind: NetworkAttachmentDefinition
metadata:
  name: fab1nw
  namespace: <namespace>
spec:
  config: '{
      "cniVersion": "0.3.1",
      "name": "fab1nw",
      "type": "bridge",
      "bridge": "fab1nw",
      "isDefaultGateway": false,
      "forceAddress": false,
      "ipMasq": false,
      "mtu": 9000
    }'
---
apiVersion: "k8s.cni.cncf.io/v1"
kind: NetworkAttachmentDefinition
metadata:
  name: mgmt
  namespace: <namespace>
spec:
  config: '{
      "cniVersion": "0.3.1",
      "name": "mgmt",
      "type": "macvlan",
      "mode": "bridge",
      "master": "<HOST_INT_NAME>",
      "mtu": 1500
    }'
---
apiVersion: "k8s.cni.cncf.io/v1"
kind: NetworkAttachmentDefinition
metadata:
  name: port1
  namespace: <namespace>
spec:
  config: '{
      "cniVersion": "0.3.1",
      "name": "port1",
      "type": "macvlan",
      "mode": "passthru",
      "master": "<HOST_INT_NAME>",
      "mtu": 9000
    }'

pod.yml file contents

apiVersion: v1
kind: Pod
metadata:
  name: srsim
  namespace: <namespace>
  annotations:
    k8s.v1.cni.cncf.io/networks: mgmt@mgmt, fab1nw@fab1nw, port1@e1-1-c1-1
spec:
  containers:
  - name: sim-b
    image: localhost/nokia/srsim:25.10.R1
    imagePullPolicy: Never
    env:
      - name: NOKIA_SROS_MGMT_IF
        value: mgmt 
      - name: NOKIA_SROS_FABRIC_IF
        value: fab1nw 
      - name: NOKIA_SROS_CHASSIS
        value: SR-1
      - name: NOKIA_SROS_SLOT
        value: "A"
      - name: NOKIA_SROS_CARD
        value: cpm-1
      - name: NOKIA_SROS_MDA_1
        value: me6-100gb-qsfp28
      - name: NOKIA_SROS_MDA_2
        value: me12-100gb-qsfp28
      - name: NOKIA_SROS_ADDRESS_IPV4_ACTIVE
        value: <MGMT_ADDRESS>
      - name: NOKIA_SROS_STATIC_ROUTE_1
        value: 0.0.0.0/0@<MGMT NEXTHOP>
      - name: NOKIA_SROS_SYSTEM_BASE_MAC
        value: fa:ac:ff:ff:10:00
    volumeMounts:
      - name: config
        mountPath: /nokia/config/
      - name: license
        mountPath: /nokia/license/
    securityContext:
      capabilities:
        add: ["CHOWN", "IPC_LOCK", "NET_ADMIN", "NET_BIND_SERVICE", "NET_RAW", "SYS_CHROOT", "SYS_RESOURCE", "SYS_TIME"]
    tty: true
    stdin: true
    resources:
      requests:
        memory: 0
        cpu: 0
      limits:
        memory: 4194304Ki
        cpu: 2
  volumes:
    - name: config
      nfs:
        server: <SERVER_IP>
        path: <CONFIG_PATH>
    - name: license
      nfs:
        server: <SERVER_IP>
        path: <LICENSE_PATH>