Cisco Catalyst Center delivers a comprehensive, software-defined approach to managing enterprise networks. It simplifies operations by integrating automation, real-time monitoring, security policies, and advanced analytics into a single interface. Designed to support complex networking environments, Catalyst Center optimizes efficiency, enhances security, and ensures seamless connectivity across wired and wireless infrastructures.
Meraki does what should be expected at it's price point, but it is geared to SMB. When it comes to enterprise networks, DNA Center is the clear path forward. It allows for more devices than just the ones it configures, it provides more customization and on boarding options, ā¦
It is very comparable, and both do about the same thing. However, we do find ACI more suitable for our datacenter, as opposed to our main company network.
If it met their requirements, I'd say it's probably a 10. If they could go down with Cisco route, especially driving software defined access, then it's the only show in town for that. If they didn't want to go down the software defined access route and the more traditional side, there might be other tools that they might want to consider just because of a flexibility which other tools might allow them to have.
It fits perfectly in all our data centers where we are using it. For small companies or smaller racks or something. I don't think it fits there because Cisco Nexus Series Switches is a big one. It's the most advanced one.
I really like the assurance. I like that I can go through and find problems on the network that could be a mismatch VLAN between two interfaces, port errors, like physical errors that we otherwise probably would need to wait for a customer to complain or we have that we can see that ahead of time and be proactive and say, Hey, I'm noticing that this port is having some errors on it. We might want to check that out ahead of time before it becomes an issue. So that's really useful. And then also being able to configure the network. I think that the programmability part of it, I think I have, I've been having some struggle with that initially, just having to apply. So I have my script, my template that I want to deploy, but in order to deploy it, I have to apply it to a template or a profile and then I have to assign that profile to a group of switches that I want to program. I think it gets a little bit messy and a little bit convoluted, but other than that, I mean it's really helpful. It does automate right now, I think it seems a little convoluted with the process.
Maintenance, upgrades, and software certification can be performed without service interruptions because of the modular nature of NX-OS and features such as In-Service Software Upgrade (ISSU) and the capability for processes to restart dynamically
FabricPath:
Enables each device to build an overall view of the topology; this is similar to other link state routing protocols. Each device in the FabricPath topology is identified by a switch-id. The Layer 2 forwarding tables are built based on reachability to each switch-id, not by the MAC address. Eliminates spanning-tree to maximize network bandwidth and flexibility in topological configurations, as well as simplify operational support and configuration. This enables a tremendous amount of flexibility on the topology because you can now build FabricPath topologies for Layer 2-based networks the same as for Layer 3-based networks
Overlay Transport Virtualization (OTV): Enables the Layer 2 extension between distributed data centers over any transport Layer 3 network
The one thing that we had to get used to was really breaking down our wireless. We integrated our 9800 controllers into it, and the breakdown of our tags being floor specific and not just being campus specific was a challenge for us. And so we had to create all new tags and it wasn't necessarily a problem, it just required a little bit redesign on our wireless. And so it would've been nice for us to be able to assign a tag to an entire campus versus a floor, but that's a small complaint.
Implementing jumbo frames on interfaces of its fabric extender series (N2k, etc.) by editing the network QoS does not have to be a global configuration that would affect all its interfaces. It can be improved to become just an interface configuration.
Licensing on the NXOS is a bit complicated and expensive. I understand that the Nexus is made for core data center switching but it does not have to break the bank.
OTV technology is for Nexus only. Based on the advantage of the technology, it should be made vendor-neutral to accommodate other vendor devices.
The first impressions using the tool, led us to believe that it will be very helpful going forward. There's a lot of potential to implement other features in the network
Actually if we need to implement or develop our actual DC we will use Cisco Nexus Series Switches again. The solution is well known and we will be able to interconnect easily the switches, as we're not using all the possibilities of features we know what is solution is a long term solution.
Cisco DNA Center is going to help us in security, simplicity and ease of administration. Cisco DNA Center is complete management and control platform that simplifies and streamlines network operations. Cisco DNA Center offers a single dashboard for every core function in your network. With this platform, IT can become more nimble and respond to changes and challenges faster and more intelligently.
The platform has a good performance. The major issue is all the bugs you can discover across the operations, and it can be a big challenge depending on the number of Cisco Nexus Series Switches you have deployed. In our case, we own more than 200 Cisco Nexus Series Switches 9k, and we face an upgrade process, it could be a long time project to grant a new software deployment in all our switches platform.
These switches are very fast. They've been designed to work within the data center. We connect them to Cisco UCS-B Mini servers with the storage being directly attached. They are able to handle the data traffic pretty easily. We can also move servers pretty fast from data center to data center without overloading them. This has allowed our company to stay running during any kind of conditional outage. We have come to really rely on them for business continuity.
El soporte de CISCO DNA Center es muy bueno, responden a mis dudas pero no he tenido oportunidad de reportar un incidente o determinar un tiempo de respuesta critico. The support of CISCO DNA Center is very good, they answer my questions, but I have not had the opportunity to report an incident or determine a critical response time.
Overall, Cisco has great products and I believe that they believe in the philosophy of a great customer experience. Although there have been a few technical support issues that caused a lot of company anxiety, in most cases, Cisco has gone above and beyond in making a valiant effort to help the customer solve any issues.
We haven't used anything like this. We looked at the competitors. I think we are quite early in their products, so I think now Cisco DNA center is quite mature, still in heavy development, but compared to the competitors, we think that there is nothing like it out there.
The Cisco 9000 stacks up quite well against the Cisco Catalyst 3850 switches. The additional features available in the Nexus 9000, such as VPN, FCoE, 40 gigabits, give us the ability to support the future needs of the company in our data center. The Nexus 9000 allowed us to condense our core and aggregation environment that comprised of 2 Catalyst 6504 and 2 Catalyst 6509 to a port of Nexus 9000. Although the Catalyst 3850 would be sufficient to handle routing, those features in the Nexus 9000 made it the clear choice for us.
The Nexus 3000 series switches are data center switches, so I would say they have similar security ability to other switches in this segment. I don't have a lot of experience doing more than basic ACL security on switches, but I know these can be integrated into other security solutions like Cisco ISE and 802.1x authentication. It could also be integrated into an ACI solution to add micro segmentation, which would bring in other security functions.
Initial cost is pricy, but management needs to understand the value this provides so make them aware
Reporting could be improved in more detail in our opinion, but it gives a great overview of your environment. High level overview for managers would be greatly appreciated with as little or much detail as needed for certain Cisco gear.
Does not work as well with some older Cisco equipment because they want you to buy new, again the cost impact comes into play.