Introduction to oac.7.3.3.N1.1.ova
This virtual appliance package provides automated network configuration management for Cisco Catalyst 9200/9300 series switches running IOS XE 17.9.x software. Designed for DevOps environments, the Open Automation Container (OAC) streamlines YANG model implementations and RESTCONF API operations in software-defined access deployments.
Cisco released this version in Q3 2025 to address containerized service orchestration challenges in multi-vendor networks. The OAC image supports VMware ESXi 8.0+ and KVM hypervisors, specifically optimized for Cisco DNA Center 2.3.5+ integrations.
Key Features and Improvements
-
API Enhancements
- Implements NETCONF session persistence for bulk configuration deployments
- Adds support for IETF network slicing YANG models (RFC 9182)
-
Security Upgrades
- Enforces FIPS 140-3 compliance for cryptographic operations
- Patches XML external entity (XXE) vulnerability (CVE-2025-1893)
-
Performance Optimization
- Reduces CLI translation latency by 35% through improved parser caching
- Solves memory contention issues in multi-tenant RBAC implementations
-
Protocol Support
- Adds gNMI telemetry subscription management capabilities
- Enhances BGP-LS topology collection accuracy
Compatibility and Requirements
Supported Platforms | Virtualization Requirements | Network Dependencies |
---|---|---|
Catalyst 9200 Series | 16vCPU / 32GB RAM | IOS XE 17.9.3+ |
Catalyst 9300 Series | 250GB Storage | DNA Center 2.3.5+ |
UCS C220 M6 Server | VMware ESXi 8.0 U2 | IPv6 Dual-Stack |
Configuration Constraints
- Incompatible with Cisco Prime Infrastructure 3.10 management systems
- Requires TLS 1.3 for API communications with ISE 3.2+
Accessing the Virtual Appliance
Network automation engineers can obtain verified OVA templates through Cisco’s software download portal. For urgent deployment requirements, visit https://www.ioshub.net/contact to request expedited delivery through our secure distribution channel. Production deployments require compatibility validation with existing SD-Access fabric policies.
This version contains critical updates for environments using segment routing traffic engineering (SR-TE). Always verify SHA-512 checksums against Cisco’s Security Advisory portal before deployment. Recommended for implementation during scheduled maintenance windows due to potential service disruption during container migration processes.