Chose Cisco 9000 Series Aggregation Services Routers (ASR 9000)
Management is more comfortable with Cisco gear due to familiarity. The old adage that "Nobody was ever fired for IBM" translates perfectly to Cisco: "Nobody was ever fired for buying Cisco." In this case, our hands were forced into making a hardware upgrade. With a big leap …
Chose Cisco 9000 Series Aggregation Services Routers (ASR 9000)
We have replaced our [Cisco] 9000 [Series Aggregation Services Routers] with NCS 5500. The [Cisco] 9000 [Series Aggregation Services Routers] was able to handle the features we needed better than the NCS. We had to move our layer 2 down to Nexus switches.
Cisco Nexus Series Switches
Verified User
Consultant
Chose Cisco Nexus Series Switches
Improved software designed for high availability, performance in Data Center
Cisco 9000 Series Aggregation Services Routers (ASR 9000)
Cisco Nexus Series Switches
Likelihood to Recommend
Cisco
It is very well suited to act as your aggregator / core switch for mid to large facilities. it is flexible enough to really be useable in small environments but costs may hinder that. It has redundancy of power and management blades that does add a lot of peace of mind and security. Really the only reason you would not use a 9000 series is frankly cost and/or real requirements for performance. They have several versions of this model, plus they have an entire set of lines that can accommodate nearly as much as the 9000. Less demand or less of a budget can weigh in the decision to select this particular model.
It fits perfectly in all our data centers where we are using it. For small companies or smaller racks or something. I don't think it fits there because Cisco Nexus Series Switches is a big one. It's the most advanced one.
Maintenance, upgrades, and software certification can be performed without service interruptions because of the modular nature of NX-OS and features such as In-Service Software Upgrade (ISSU) and the capability for processes to restart dynamically
FabricPath:
Enables each device to build an overall view of the topology; this is similar to other link state routing protocols. Each device in the FabricPath topology is identified by a switch-id. The Layer 2 forwarding tables are built based on reachability to each switch-id, not by the MAC address. Eliminates spanning-tree to maximize network bandwidth and flexibility in topological configurations, as well as simplify operational support and configuration. This enables a tremendous amount of flexibility on the topology because you can now build FabricPath topologies for Layer 2-based networks the same as for Layer 3-based networks
Overlay Transport Virtualization (OTV): Enables the Layer 2 extension between distributed data centers over any transport Layer 3 network
[The] upgrade process [is] overly complicated compared to NX-OS or IOS. New images and the current configuration need to be compiled into "golden IOS's". If you don't include the configuration, you will have a clean device with no configuration.
[There are] major bugs in every release. We have had to cycle through all of our routers 3 times in the last year for updates due to show-stopping bugs that did not come to light until after the changes were made in production.
[It has] terrible documentation. You have to mine their site to get to any documentation for recent versions of IOS-XR. If you make the leap from 32-bit cXR to 64-bit eXR, then the documentation is more or less non-existent. Due to the internal architecture of hardware itself, technical specs can change from software version to software version, so don't expect any sort of firm scalability numbers. You'll have to rely on your sales engineer for that.
Implementing jumbo frames on interfaces of its fabric extender series (N2k, etc.) by editing the network QoS does not have to be a global configuration that would affect all its interfaces. It can be improved to become just an interface configuration.
Licensing on the NXOS is a bit complicated and expensive. I understand that the Nexus is made for core data center switching but it does not have to break the bank.
OTV technology is for Nexus only. Based on the advantage of the technology, it should be made vendor-neutral to accommodate other vendor devices.
Actually if we need to implement or develop our actual DC we will use Cisco Nexus Series Switches again. The solution is well known and we will be able to interconnect easily the switches, as we're not using all the possibilities of features we know what is solution is a long term solution.
The code for the switch is slightly different than the 2960X series that it is replacing, but still very familiar. It was relatively straightforward to work around this minor issue. The switch itself is solid and is very flexible as well as reliable.
The platform has a good performance. The major issue is all the bugs you can discover across the operations, and it can be a big challenge depending on the number of Cisco Nexus Series Switches you have deployed. In our case, we own more than 200 Cisco Nexus Series Switches 9k, and we face an upgrade process, it could be a long time project to grant a new software deployment in all our switches platform.
At the time (during 2020 - COVID) there was an issue getting the new switches due to circumstances around COVID with reduced work force, etc. Generally we have not had an issue getting the product in a timely fashion.
These switches are very fast. They've been designed to work within the data center. We connect them to Cisco UCS-B Mini servers with the storage being directly attached. They are able to handle the data traffic pretty easily. We can also move servers pretty fast from data center to data center without overloading them. This has allowed our company to stay running during any kind of conditional outage. We have come to really rely on them for business continuity.
In some ways, the platform is a big improvement over our previous IOS and NX-OS devices: They offer version-controlled configuration staging/commits. They have a robust portfolio of network protocols and features even beyond datacenter devices. Due to the use of NPUs instead of relying entirely on ASICs for forwarding, new versions of the software are able to improve hardware performance and capacity. Unfortunately, I have run into more bugs on IOS-XR than I ever did on IOS or even NX-OS (which has a shocking number of bugs of its own) and you have to be a licensing guru to get your order right the first time.
Overall, Cisco has great products and I believe that they believe in the philosophy of a great customer experience. Although there have been a few technical support issues that caused a lot of company anxiety, in most cases, Cisco has gone above and beyond in making a valiant effort to help the customer solve any issues.
Really, the only issue encountered when deploying the new 9000 series was attempting to copy a working config from an older series switch and applying it to the new 9000 series. Once it was explained that a new switch configuration needs to be built up specifically for the 9000 and deployed were the issues resolved.
When we are integrating the ASR9000 router with other devices then there should be the same device that can cater to the throughput. We can use the Cisco 9600 Switch which can be easily integrated and can handle the speed in terms of uplinks 40G can be handled. Adding to this Cisco DNA Center can be integrated to do the automation and monitoring purposes.
The Cisco 9000 stacks up quite well against the Cisco Catalyst 3850 switches. The additional features available in the Nexus 9000, such as VPN, FCoE, 40 gigabits, give us the ability to support the future needs of the company in our data center. The Nexus 9000 allowed us to condense our core and aggregation environment that comprised of 2 Catalyst 6504 and 2 Catalyst 6509 to a port of Nexus 9000. Although the Catalyst 3850 would be sufficient to handle routing, those features in the Nexus 9000 made it the clear choice for us.
We work directly with our vendor/partner who works closely with our ability to pay at certain times of the year due to budget restraints of public education.
Depending on the model of 9000, it can be as simple of a setup as needed, or can be as expandable as required. The units we purchased only had SFP ports for basic trunk line configuration
The Nexus 3000 series switches are data center switches, so I would say they have similar security ability to other switches in this segment. I don't have a lot of experience doing more than basic ACL security on switches, but I know these can be integrated into other security solutions like Cisco ISE and 802.1x authentication. It could also be integrated into an ACI solution to add micro segmentation, which would bring in other security functions.
We didn't need to buy new devices when we were increasing backbone capacity from 1G to 10G.
Due to the modular nature of the software, when there is an issue with any running services, we need not reboot the whole device which affects all clients and availability.