183 Reviews and Ratings
7 Reviews and Ratings
No answers on this topic
Fairly stable and easy to operate - but I haven't any experience with other brands, so I don't have anything to compare with. Fairly fast in the OS. Easy to upgrade - but with some SW issues. Sometimes clearing of log folders is needed. Access to bash is cool. Tips & cool tricks for operations could be nice to share. Incentivized
If you've got a large network and are already using FortiGate firewalls or FortiAP access points, integrating FortiSwitch Secure Access Switches makes for one integrated solution. Previously we had Cisco switches that had to be configured and managed separately, which was always prone to error. Now that we have our entire network backbone on FortiNet devices, managing and configuring them is smoother. We are now able to see much clearer if there are any configuration issues between networking devices.Incentivized
Continuous system operation:Maintenance, upgrades, and software certification can be performed without service interruptions because of the modular nature of NX-OS and features such as In-Service Software Upgrade (ISSU) and the capability for processes to restart dynamicallyFabricPath:Enables each device to build an overall view of the topology; this is similar to other link state routing protocols. Each device in the FabricPath topology is identified by a switch-id. The Layer 2 forwarding tables are built based on reachability to each switch-id, not by the MAC address. Eliminates spanning-tree to maximize network bandwidth and flexibility in topological configurations, as well as simplify operational support and configuration. This enables a tremendous amount of flexibility on the topology because you can now build FabricPath topologies for Layer 2-based networks the same as for Layer 3-based networksOverlay Transport Virtualization (OTV): Enables the Layer 2 extension between distributed data centers over any transport Layer 3 networkIncentivized
Makes them easy to manage within one spotAllows for advanced network configurationHas plenty of power for all our PoE devicesIncentivized
Implementing jumbo frames on interfaces of its fabric extender series (N2k, etc.) by editing the network QoS does not have to be a global configuration that would affect all its interfaces. It can be improved to become just an interface configuration.Licensing on the NXOS is a bit complicated and expensive. I understand that the Nexus is made for core data center switching but it does not have to break the bank.OTV technology is for Nexus only. Based on the advantage of the technology, it should be made vendor-neutral to accommodate other vendor devices.Incentivized
Would be nice to have a bit different layout on the configuration page. Sometimes can be hard to find what you're looking for.When disabling ports, it would be nice to have batch setting features rather than having to make changes individually.Incentivized
We will use it for a long time, since they are switches with great capacity and positive results, they promote the perfect operation of our data center, I always recommend them, because they are switches with good results.Incentivized
In our environment (and especially during COVID and the Work From Home era), I would really like our network devices to be more resilient [against} errors in remote configuration. Having a standard, easy to use, configure, commit/deploy, rollback system should be installed, but it's not there. Other companies have been providing this for over 20 years, and Cisco does this on some of their devices. Why not all?Incentivized
Our network is very well design. Any components or device failure. Doesn't affect network availabilityIncentivized
These switches are very fast. They've been designed to work within the data center. We connect them to Cisco UCS-B Mini servers with the storage being directly attached. They are able to handle the data traffic pretty easily. We can also move servers pretty fast from data center to data center without overloading them. This has allowed our company to stay running during any kind of conditional outage. We have come to really rely on them for business continuity.Incentivized
Overall, Cisco has great products and I believe that they believe in the philosophy of a great customer experience. Although there have been a few technical support issues that caused a lot of company anxiety, in most cases, Cisco has gone above and beyond in making a valiant effort to help the customer solve any issues.Incentivized
Trainer didn't has good handon experience.. he was bookish trainer.Incentivized
Never had itIncentivized
It is reliable and working as expectedIncentivized
The Cisco 9000 stacks up quite well against the Cisco Catalyst 3850 switches. The additional features available in the Nexus 9000, such as VPN, FCoE, 40 gigabits, give us the ability to support the future needs of the company in our data center. The Nexus 9000 allowed us to condense our core and aggregation environment that comprised of 2 Catalyst 6504 and 2 Catalyst 6509 to a port of Nexus 9000. Although the Catalyst 3850 would be sufficient to handle routing, those features in the Nexus 9000 made it the clear choice for us.Incentivized
We have previously used both Cisco 220 Series and Dell PowerConnect 8000 Series switches that were managed separately from our firewalls and access points. The Cisco and Dell switch worked fine and we never had a problem with them, but it was always a hassle to have to make configuration changes since that would have to be done via separate GUIs. Having the ability to configure and manage firewalls, switches, and wireless access points all within one central GUI saves time and headache.Incentivized
The Nexus 3000 series switches are data center switches, so I would say they have similar security ability to other switches in this segment. I don't have a lot of experience doing more than basic ACL security on switches, but I know these can be integrated into other security solutions like Cisco ISE and 802.1x authentication. It could also be integrated into an ACI solution to add micro segmentation, which would bring in other security functions.Incentivized
We expected the switches to provide ROI and they did as advertised.NX-OS was pretty similar to IOS so the learning curve was pretty low.Being a Non-Profit we need to be extremely cost conscience and buy gear that has a long shelf life. Nexus line of switches met this objective.Incentivized
It has made management of the network much easier and less time consumingWe are more confident that our network traffic is being securedAbility to monitor network traffic and detect potential anomaliesIncentivized