The Cisco 5520 Series Wireless LAN Controller is a highly scalable, service-rich, resilient, and flexible platform that is ideal for medium-sized to large enterprise and campus deployments.
N/A
Cisco Catalyst 9800 Series Wireless Controllers
Score 8.9 out of 10
N/A
The Cisco Catalyst 9800-80 is a modular wireless controller with optional 100 Gigabit Ethernet (G) modular uplinks boasting seamless software updates for large enterprises and campuses, and security with ETA and SD-Access.
Cisco Identity Services Engine is well integrated on Cisco 5520 Wireless Controller because the WLC supports a lot of authentication methods and security protocols (such as PEAP, EAP-TLS, Captive Portal redirect). They perform very well with ISE. Cisco ISE is able to manage …
Chose Cisco Catalyst 9800 Series Wireless Controllers
Cisco Catalyst 9800 Series Wireless Controllers is more modern, looks better, supports newer access points. Using different tags - site tags, policy tags, etc. is a nice way to configure different access point groups or locations. Also Cisco Catalyst 9800 Series Wireless …
I consider that its implementation is recommended for configurations where the amount of access points exceeds 50 devices and the performance exceeds 4 Gbps. In environments where the access point density is less than 10 units, we can use the option of Express Mobility.
for well suited, with all these big organizations you can have regional or distributed controller base. I think this is better and then you can consolidate things. All this whole infrastructure to the single locations. Not be a good fit? If you have a small organizations then yeah, maybe some other traditional physical controller.
I guess it's very good at managing large scale deployments because I can change configuration on basically all of our devices at once if I want to. It gives us a quick and easy overview of all of the clients, all of the healthy status of our devices.
It's very good at troubleshooting because it pulls logs from a hardware level, whereas otherwise we'd have to log into each device ourselves and get those logs. It does that automatically.
We have had some issues with access points losing their configurations and going offline. This is not a common issue and we are not entirely certain if it is a fault of the controller or the individual APs. That said, the controller does not appear to retain the knowledge of the offline AP which can be a management headache.
If possible, please add a column for WAP Name and WAP Model within the 2.4/5/6 GHz radio sections, as we have different models of WAPs in the fleet, and it would be easier to identify WAPs within a building.
We conduct digital exams for our students. If there is a way to identify clients and block traffic for applications like ChatGPT, it would be greatly appreciated. Currently, there is no filter for ChatGPT or generative AI.
This equipment from Cisco has been dependable and we are able to easily continue to add access points or make changes easily to the Wi-Fi password settings.
We have been operating this equipment for a number of years and it does not give us any issues.
Despite common software and hardware issues this is still the best product on the market for large scale enterprise deployments. Cisco has worked with us extensively to reduce the amount of bugs in every iteration however new bugs are introduced or new incompatibilities always arise with major releases. Thus, while I'm hesitant to recommend the product it's still much better than all the other competitors such as Aruba and Juniper in the WIFi space. There is also extensive integration with DNAC/Catalyst Center and ISE in an SDA deployment. Recently there has been a number of critical issues with the controller software and Cisco has proved themselves to be incapable of timely troubleshooting and diagnosis. This has reduced our confidence in the product and it's current and future stability and maintainability. At it's current state the product is taking up too much of our engineering resources to maintain despite also paying for premium support from Cisco. As such I have reduced by rating as we are likely to look at alternative vendors for our long-term wireless management solution
In the dailies activities it's simple to manage a wireless network and also to perform changes: the GUI is well known and intuitive for engineers that know how to operate on Cisco WLC. It has High Throughput and consolidated features such as CleanAir, Roaming supporting natively Cisco ISE authentication methods and DNA Center. It's recommended for Wi-Fi 5 wireless infrastructures.
High availability options are very good. You have multiple options so you can select whichever suits you well. Also you can mix it up if you have more controllers so your downtime risk decreases sharply. Users will not feel any connection issues thanks to powerful and flexible high availability options that Cisco provides.
While it works well in general, there are some bugs in both the GUI and functionality. It has caused spikes of downtime in our network. The HA also is quite cumbersome and specific to set up, while not having the most reliable working around.
Cisco support is always ready to support and engage in any problem or issue. Starting from the implementation support, troubleshooting any software issue or hardware. Their engineers are engaging whenever we ask for support, keep following up with us, and troubleshoot any problem till we find a solution and be satisfied [with] the service.
[The] best bet is the integration with ISE. Users use their active directory credentials to access the wireless and very simple guest portal to gain access to the Internet. We plan on integrating Cisco DNA Centre in the future that will give us more visibility and improved performance.
Not much yet. In my experience from becoming a network engineer four-ish years ago to now, like I said, I used that 5520, which was a Cisco product. These 9800 are a lot smaller and tinier and they seem to do a lot more that the other ones couldn't do. It's a good product.
Implementing the [Cisco] 5520 [Wireless] Controllers offered us a huge improvement in administrative time over our previous Cisco 3850 deployment. Being able to see all of our APs on a single controller as well as centrally manage them is a great benefit. This also removed the need to deploy specific equipment in different IDFs throughout our Industrial locations and instead only requiring switches with Power Over Ethernet (POE) capability.
Wireless performance has improved with the deployment of our 5520s, which allows our plant operators to do their jobs more efficiently while on the move.
Having three Cisco 5520 Wireless Controllers provides tertiary redundancy for our wireless networks. The solution is elegantly simple. Preventing downtime is, obviously, a profound part of our supply chain capabilities.
I think that it has had a positive impact, especially with the dashboard being a university. The 9800 dashboard gives us one spot where we can go to see how many clients are on each of our SSIDs or perhaps client utilization. We've dashboard may be saying, Hey, you have one building that has 90 people connected to one access point. So that gives us the information we need to go in and expand that coverage or add in some high density to address those issues.