Cisco Nexus Dashboard simplifies data-center networks with automation and analytics. The data-center network helps organizations to meet business demands, and provision reliable data-center networking services as fast as possible, when and where organizations need it. As network infrastructure management is becoming more complex, diverse, and distributed, with multiple configuration points, monitoring tools, and vast amounts of data being generated every second. Cisco Nexus Dashboard is…
N/A
SolarWinds Network Configuration Manager (NCM)
Score 8.4 out of 10
N/A
SolarWinds Network Configuration Manager is network diagnostics and troubleshooting technology, from Austin-based SolarWinds.
We used Cisco Nexus Dashboard specifically for automating the creation of networks in our private cloud environment using a VXLAN EVPN multisite environment. It integrates into Infoblox well. It's also very suited in network troubleshooting for past and present issues. Where I don't see it being used much is in the campus but it's nice to know we have the ability to add catalyst if needed.
Network Configuration Manager is well suited for backing up configurations of all your devices. It also has a great comparison tool for seeing only the differences in config. Another great feature is it's ability to push a script to any number of devices. This is very handy for pushing changes to one, 10 or multiple devices. There are also some great reports that you can run against the devices in inventory
With the latest version release of Cisco Nexus Dashboard to version 3.0.1 I can say that most of the features have already improved but one of the wishlists that I want for ND is the possibility of extracting lists of Anomaly.
Include older versions of Firmware in the list of choices when doing the firmware upgrade analysis, currently only the recommended is in the list of choices.
If possible, include all the prechecks in the Firmware pre-upgrade analysis same in the script provided by Cisco.
For our use case, it does everything great and some of the features we underutilize but I would like to be able to set a configuration baseline when initially adding a node instead of after the configuration is pulled but it's not a particularly big deal to let it pull the configuration then set it as the baseline.
We observe significant product development with each release, along with substantial expansion of functionality. The program code has been consolidated into a single image, which simplifies installation and routine system update operations. Additionally, it is possible to install it outside the production network, which further enhances the solution’s availability.Additionally, the new graphical interface is very simplified and user-friendly.
Medium complexity to set up in the beginning if using any non-standard devices or configurations, else fairly easy (e.g. Cisco Nexus or IOS-based devices). Reports are fairly straightforward to set up. Updates to the platform are fairly straightforward and don't take a major effort. Easy to add or remove devices.
For the end user, it is relatively easy to use. However, some training and practice is a must because the NSO is not as straightforward as the traditional router CLI. For the administrator, Cisco Network Service Orchestrator (NSO) is just like another program running on the Linux system--there is no big difference.
The user interface is lacking. It is difficult to navigate at times and things can be done multiple ways. Quite often I am confused by how their notification structure works. It is not very intuitive. They do offer a free Academy. They also offer a community of other technical folks. I have enjoyed both.
Great and effective automation functionalities and the tools on network security management are the best and easy data reports building. Cisco Nexus Dashboard Fabric Controller feature for the network monitoring and easy management of various services and even offers the best analytics and also powerful integration tools for easy data migration.
here was never a need to contact support, as the system includes several commands that allow for self-healing. Even if, after the upgrade process, one of the processes was not running, I was able to quickly find the appropriate sequence of commands that definitively resolved the issue. The entire architecture was designed in such a way as to be resilient to the failure of one node in a three-server setup.
To be fair, I have not had to involve Support in a number of years, but when I did, I was greeted with enthusiastic engineers who wanted to understand and solve the issue. It was a fairly complex scenario and I have discovered in my most recent implementation that engineering included that option as a standard now.
Solarwinds has actually produced new training since I last used it that is available on their site at any time. Their previous training was more than enough to get us started but now there is significantly more content. Since I'm comfortable with the Orion platform and the products we use I haven't checked the new training out yet but we have new staff go through portions of that training and they always come away with an understanding of the platform and ready to use it
Honestly, the product implementation took 1–2 days to comprehensively manage the client’s entire infrastructure. The delivered on-premise solution, provided as physical servers, quickly builds the required environment in which individual data centers are rapidly added. The data collection process takes some time but also depends on the number of devices in the network.
it was a fairly easy implementation and everything was pretty straightforward. only challenge we had was getting all the snmp communities updated on the networking equipment
The Cisco Nexus Series switches perform admirably in our blended distributed system. We have been dealing with any of these sorts of switches for over 5 years and have been exceptionally happy with their functionality. Several of our other computer networks in our data rooms have proved effective with Cisco equipment. Because of the simplicity of maintenance and the high quality of technical support provided by Cisco representatives, there is a high level of trust in these switches.
At the time SolarWinds was the biggest player in the space and their whole portfolio was very comprehensive. As time progressed and newer technologies came about (i.e. SDWAN) their products couldn't keep up with the consumer demands and changing market. Security became such a big focus that once Solarwinds got hacked we had to remove all their products from our environment
The platform is very well done, and to date, I have had no complaints about the implementation of the platform and no security issues or vulnerabilities. Cisco in all its product releases new versions to resolve security issues or bugs that appear on the platform, this is a big plus.
Saves 100s of hours a year in man hours over manual configuration.
Saved easily 50k in lost revenue when a switch rebooted with months old unsaved configuration. NCM let us quickly restore a snapshot of the running config from the previous day.
Saves us several man hours per week of config auditing by reducing all changes to a summary email.