Cisco Catalyst Center delivers a comprehensive, software-defined approach to managing enterprise networks. It simplifies operations by integrating automation, real-time monitoring, security policies, and advanced analytics into a single interface. Designed to support complex networking environments, Catalyst Center optimizes efficiency, enhances security, and ensures seamless connectivity across wired and wireless infrastructures.
N/A
Ansible
Score 9.2 out of 10
N/A
The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.
Meraki does what should be expected at it's price point, but it is geared to SMB. When it comes to enterprise networks, DNA Center is the clear path forward. It allows for more devices than just the ones it configures, it provides more customization and on boarding options, …
It integrates well with SD-WAN and ISE. So since we had those already, it was an easy choice. However, we have faced challenges with supporting multi-tenancy as I have told earlier. But, we can see our endpoints and get more information from ISE such as what kind of device it …
If it met their requirements, I'd say it's probably a 10. If they could go down with Cisco route, especially driving software defined access, then it's the only show in town for that. If they didn't want to go down the software defined access route and the more traditional side, there might be other tools that they might want to consider just because of a flexibility which other tools might allow them to have.
It has helped save us so much time, as it was designed to automate mundane and repetitive tasks that we were using other tools to perform and that required so much manual intervention. It does not work very well within Windows environments, understandably, but I would love to see more integration. I want it to be sexy and attractive to more than just geeky sysadmins.
I really like the assurance. I like that I can go through and find problems on the network that could be a mismatch VLAN between two interfaces, port errors, like physical errors that we otherwise probably would need to wait for a customer to complain or we have that we can see that ahead of time and be proactive and say, Hey, I'm noticing that this port is having some errors on it. We might want to check that out ahead of time before it becomes an issue. So that's really useful. And then also being able to configure the network. I think that the programmability part of it, I think I have, I've been having some struggle with that initially, just having to apply. So I have my script, my template that I want to deploy, but in order to deploy it, I have to apply it to a template or a profile and then I have to assign that profile to a group of switches that I want to program. I think it gets a little bit messy and a little bit convoluted, but other than that, I mean it's really helpful. It does automate right now, I think it seems a little convoluted with the process.
Debugging is easy, as it tells you exactly within your job where the job failed, even when jumping around several playbooks.
Ansible seems to integrate with everything, and the community is big enough that if you are unsure how to approach converting a process into a playbook, you can usually find something similar to what you are trying to do.
Security in AAP seems to be pretty straightforward. Easy to organize and identify who has what permissions or can only see the content based on the organization they belong to.
The one thing that we had to get used to was really breaking down our wireless. We integrated our 9800 controllers into it, and the breakdown of our tags being floor specific and not just being campus specific was a challenge for us. And so we had to create all new tags and it wasn't necessarily a problem, it just required a little bit redesign on our wireless. And so it would've been nice for us to be able to assign a tag to an entire campus versus a floor, but that's a small complaint.
YAML is hard for many to adopt. Moving to a system that is not as white space sensitive would likely increase uptake.
AAP and EDA should be more closely aligned. There are differences that can trip users of the integration up. An example would be the way that variables are used.
Event-driven Ansible output is not as informative as AAP.
The first impressions using the tool, led us to believe that it will be very helpful going forward. There's a lot of potential to implement other features in the network
Even is if it's a great tool, we are looking to renew our licence for our production servers only. The product is very expensive to use, so we might look for a cheaper solution for our non-production servers. One of the solution we are looking, is AWX, free, and similar to AAP. This is be perfect for our non-production servers.
Cisco DNA Center is going to help us in security, simplicity and ease of administration. Cisco DNA Center is complete management and control platform that simplifies and streamlines network operations. Cisco DNA Center offers a single dashboard for every core function in your network. With this platform, IT can become more nimble and respond to changes and challenges faster and more intelligently.
Great in almost every way compared to any other configuration management software. The only thing I wish for is python3 support. Other than that, YAML is much improved compared to the Ruby of Chef. The agentless nature is incredibly convenient for managing systems quickly, and if a member of your term has no terminal experience whatsoever they can still use the UI.
El soporte de CISCO DNA Center es muy bueno, responden a mis dudas pero no he tenido oportunidad de reportar un incidente o determinar un tiempo de respuesta critico. The support of CISCO DNA Center is very good, they answer my questions, but I have not had the opportunity to report an incident or determine a critical response time.
There is a lot of good documentation that Ansible and Red Hat provide which should help get someone started with making Ansible useful. But once you get to more complicated scenarios, you will benefit from learning from others. I have not used Red Hat support for work with Ansible, but many of the online resources are helpful.
We haven't used anything like this. We looked at the competitors. I think we are quite early in their products, so I think now Cisco DNA center is quite mature, still in heavy development, but compared to the competitors, we think that there is nothing like it out there.
I haven't thought of any right now other than just doing our own home-brewed shell scripts. Command line scripts. And how does this compare? It's light years ahead, especially with the ability to share credentials without giving the person the actual credentials. You can delegate that within, I guess what used to be called Ansible Tower, which is now the Ansible Automation platform. It lets you share, I can give you the keys without you being able to see the keys. It's great
Initial cost is pricy, but management needs to understand the value this provides so make them aware
Reporting could be improved in more detail in our opinion, but it gives a great overview of your environment. High level overview for managers would be greatly appreciated with as little or much detail as needed for certain Cisco gear.
Does not work as well with some older Cisco equipment because they want you to buy new, again the cost impact comes into play.