Cisco Catalyst 8000 Edge Platforms deliver secure, high-performance SD-WAN built for hybrid work, multicloud access, and 5G-ready networks. Powered by Cisco IOS XE, these devices combine flexible routing, SASE integration, and cloud-native agility to support AI-driven networking and edge computing needs.
We made a simple overview of the market, Cisco is still a leader. vPC is a must know for any Cisco lover and any network engineer, actually is the most simple way to aggregate switches and provide high performance without going to a more complex solution and also we choose to …
With the flexibility of sizing options, the Cisco Catalyst 8000 Edge Platforms has worked to deliver solutions for our various needs. Smaller systems offer strong connectivity for office developments. Mid-range options have served our larger campuses well. Our data center deployments of the larger systems have provided up to 100G connectivity and advanced routing solutions. The Cisco Catalyst 8000 Edge Platforms continues to meet our needs and exceed our expectations.
It fits perfectly in all our data centers where we are using it. For small companies or smaller racks or something. I don't think it fits there because Cisco Nexus Series Switches is a big one. It's the most advanced one.
Maintenance, upgrades, and software certification can be performed without service interruptions because of the modular nature of NX-OS and features such as In-Service Software Upgrade (ISSU) and the capability for processes to restart dynamically
FabricPath:
Enables each device to build an overall view of the topology; this is similar to other link state routing protocols. Each device in the FabricPath topology is identified by a switch-id. The Layer 2 forwarding tables are built based on reachability to each switch-id, not by the MAC address. Eliminates spanning-tree to maximize network bandwidth and flexibility in topological configurations, as well as simplify operational support and configuration. This enables a tremendous amount of flexibility on the topology because you can now build FabricPath topologies for Layer 2-based networks the same as for Layer 3-based networks
Overlay Transport Virtualization (OTV): Enables the Layer 2 extension between distributed data centers over any transport Layer 3 network
Implementing jumbo frames on interfaces of its fabric extender series (N2k, etc.) by editing the network QoS does not have to be a global configuration that would affect all its interfaces. It can be improved to become just an interface configuration.
Licensing on the NXOS is a bit complicated and expensive. I understand that the Nexus is made for core data center switching but it does not have to break the bank.
OTV technology is for Nexus only. Based on the advantage of the technology, it should be made vendor-neutral to accommodate other vendor devices.
Because I have had no issues with this product line and have grown go really trust in it. One of the besr thing is that this has had less vulnerabilities that the past cisco router that I have dealt with. In my line of work needing to upgrade code is always something that needs to be done after hours and most likely on weekends.
Actually if we need to implement or develop our actual DC we will use Cisco Nexus Series Switches again. The solution is well known and we will be able to interconnect easily the switches, as we're not using all the possibilities of features we know what is solution is a long term solution.
Either you deploy those routers as a standalone, or as part of the SD-WAN fabric, the amount of features and settings you can configure on them, is well beyond any other vendor or product on the market. While this may bring some configuration complexity, availability of support for variaty of different protocols and features allows you to solve almost any network challenge you may face
The platform has a good performance. The major issue is all the bugs you can discover across the operations, and it can be a big challenge depending on the number of Cisco Nexus Series Switches you have deployed. In our case, we own more than 200 Cisco Nexus Series Switches 9k, and we face an upgrade process, it could be a long time project to grant a new software deployment in all our switches platform.
These switches are very fast. They've been designed to work within the data center. We connect them to Cisco UCS-B Mini servers with the storage being directly attached. They are able to handle the data traffic pretty easily. We can also move servers pretty fast from data center to data center without overloading them. This has allowed our company to stay running during any kind of conditional outage. We have come to really rely on them for business continuity.
I have always had great response time and have never been let down by cisco support. I have had issues where the person who was assisting me was not able to provide a resolution but by utilizing his team members they where able to come together to provide a answer and resplve the situation.
Overall, Cisco has great products and I believe that they believe in the philosophy of a great customer experience. Although there have been a few technical support issues that caused a lot of company anxiety, in most cases, Cisco has gone above and beyond in making a valiant effort to help the customer solve any issues.
Compared to the Cisco 2000 Series Connected GRID Routers, CGR2010, the Cisco Catalyst 8000 Edge Platforms is more powerful in processing, and it has the capability to do the segment routing. It is easier to install physically and occupies less space in the rack, consumes less power, and saves more for the company.
The Cisco 9000 stacks up quite well against the Cisco Catalyst 3850 switches. The additional features available in the Nexus 9000, such as VPN, FCoE, 40 gigabits, give us the ability to support the future needs of the company in our data center. The Nexus 9000 allowed us to condense our core and aggregation environment that comprised of 2 Catalyst 6504 and 2 Catalyst 6509 to a port of Nexus 9000. Although the Catalyst 3850 would be sufficient to handle routing, those features in the Nexus 9000 made it the clear choice for us.
We recently use the entreprise agreement on another perimeter, I could say that is linked to the typology of deployment. On our nexus perimeter, pricing and contract terms are defined without any evolution also is quite simple.
The Nexus 3000 series switches are data center switches, so I would say they have similar security ability to other switches in this segment. I don't have a lot of experience doing more than basic ACL security on switches, but I know these can be integrated into other security solutions like Cisco ISE and 802.1x authentication. It could also be integrated into an ACI solution to add micro segmentation, which would bring in other security functions.