2019-06-19T08:36:00Z

What needs improvement with Cisco Nexus?


Please share with the community what you think needs improvement with Cisco Nexus.

What are its weaknesses? What would you like to see changed in a future version?

Guest
6565 Answers

author avatar
Real User

I don't really know any improvements that we would need right now as a company. I would say it would be nice to support more phone models in general. For us that doesn't matter as we really stick with one type of phone. There hasn't been a phone refresh — I think — in maybe five years, but I think that's kind of how Cisco rolls. They do have a 10 year run on phones. Better monitoring would be a big thing to have. The RTMT (Real-time Monitoring Tool) is good, but I also know they're moving to a web-based solution so certain updates to current products won't be on the way. Being able to drill down and have better adaptivity going forward would be nice. But I think that concentrating on the web-based solution is their plan and the way they're going. I'm looking forward to seeing how that works out.

2019-07-02T06:57:00Z
author avatar
Top 10Real User

They should make sure that the back address auto is baselined. I think it might even be baselined, so it might be that one of our team members had messed that up, but it just wasn't a very straightforward command. You should have multi-context, multi-port channel enabled on the underlay of the Firepower. The way the Firepower firewalls work is they have a management plane, and then you make the virtual ASAs on the Firepower, where you're assigning multiple interfaces or core channels on there. have fewer devices and fewer physical interfaces, yet retain a more extensive logical setup.

2019-07-02T06:57:00Z
author avatar
Top 20Real User

I would like to see more automation and for it to be easier to use.

2019-06-19T08:37:00Z
author avatar
Real User

There is some room for improvement when it comes to the frequency on the network.

2019-06-19T08:36:00Z
author avatar
Real User

The only issue that I have with this product is finding help on different commands when I'm trying to make a change. Or, if I'm troubleshooting an issue, finding what commands I need to do certain things. I know what I need to do, but I'm not sure of the exact command.

2019-06-19T08:36:00Z
author avatar
Real User

Our only complaint is about the licensing because it can always be a little more cost-effective.

2019-06-19T08:36:00Z
author avatar
Real User

Nothing is perfect.

2019-06-19T08:36:00Z
author avatar
Real User

In the next release of this solution, I would like to see a focus on backplane deployment, so you can stack more.

2019-06-19T08:36:00Z
author avatar
Top 20Real User

I would like to see the usability improved by simplifying the user interface. For example, it would be nice to have a simple way to find endpoints and get information about them. It would be great if they could make the interface a little more user-friendly, but not trade power off for simplicity.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see better collaboration with other, low-end devices.

2019-06-19T08:36:00Z
author avatar
Real User

We would like to see this solution support routing. One of the problems we have is that there is no confirmation for when you try to test a system command. It just accepts it and does not give you a response.

2019-06-19T08:36:00Z
author avatar
Real User

We would like to see OpenConfig covering most of the industry standards. The YANG models, for example, and also support for OpenFlow. The areas that need improvement are MACsec, OpenConfig, and OpenFlow.

2019-06-19T08:36:00Z
author avatar
Real User

I would love to see Active/Active FEX connectivity, which is enhanced vPC, where we could also do a vPC from a server in that type of configuration. It's still a limitation that's been carried over from the 7K that I'm surprised is still absent from the 9K. Including this would give us the highest level of redundancy without risking having orphaned ports, which we do have at times.

2019-06-19T08:36:00Z
author avatar
Real User

I really wish that Nexus and iOS commands were more similar than they are different. Standardization across iOS and Nexus operating systems would be an improvement.

2019-06-19T08:36:00Z
author avatar
Real User

They need to offer fibre switches in the 9K series. I would like to have the ability to identify ports by flashing port lights, so I can tell the user "We need to look at port four", and then I can flash the light remotely using the command line.

2019-06-19T08:36:00Z
author avatar
Real User

This solution costs a lot.

2019-06-19T08:36:00Z
author avatar
Real User

The code quality for this solution has gotten worse and needs improvement.

2019-06-19T08:36:00Z
author avatar
Real User

Being this is the first usage, we don't have any expectations yet.

2019-06-19T08:36:00Z
author avatar
Real User

Overall, I wish it was a more intuitive OS.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see some development into the SAE world where you can virtualize. That would be the only thing I would like to see because I need to start virtualizing my infrastructure gear at some of the other data centers that I have.

2019-06-19T08:36:00Z
author avatar
Real User

In terms of improvement, the stacking between the two switches in the higher availability model should be similar to Catalyst. It's better to have one interface for configuration. I hope to see more features for high-availability configuration such as a VSS configuration on the Catalyst series. To have one management console for both chassis. I also hope to see the dependency on the management interface for high-availability lowered. What needs improvement is the price on the DNA subscription. It's obligatory for all the switches and you should have the option to remove it or keep it as optional. Cisco has the option to remove it now. We have agreed that in the future, they will offer a permanent license for it.

2019-06-19T08:36:00Z
author avatar
Real User

The VLAN is a little more hand driven now. I don't know exactly why the split screen does that. If we could get some more automation integrated into it, it would make it easier.

2019-06-19T08:36:00Z
author avatar
Top 5LeaderboardReal User

I would like to see network function virtualization with no hardware. I would like to see the integration of the products into something where it's seamless where an engineer never touches the switch again, never does CLI and you move to an application based network organization.

2019-06-19T08:36:00Z
author avatar
Real User

In the next release of the solution, I would like to see varying integration between VRF (Virtual Routing and Forwarding) instances so we can integrate BGB into different VRFs in a more organized way. We have some issues with tunnels and VRFs.

2019-06-19T08:36:00Z
author avatar
Top 20Real User

One improvement needed is support for Multi-CAD scale that we were concerned about. We're not hitting any limits at this point. There were concerns about the amount of server capacity that was going to be available. We like to see things that are already there as opposed to being told where they will be.

2019-06-19T08:36:00Z
author avatar
Real User

The price is a con.

2019-06-19T08:36:00Z
author avatar
Real User

I get more of the frustration out of Juniper equipment than I do from Cisco products. Cisco Nexus is more versatile for us in comparison to Juniper. The routing is easier with Cisco.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to have the feature where you can install something like operf on it so you can do troubleshooting without having to configure operf on servers. We had issues with Cisco Nexus during upgrades. When we first got the system, we were having some issues. The whole system crashed.

2019-06-19T08:36:00Z
author avatar
Real User

They should make it easier to update the code on it. Upgrading should also be easier.

2019-06-19T08:36:00Z
author avatar
Real User

Cisco Nexus is very new. We're still on the learning curve for the 9000.

2019-06-19T08:36:00Z
author avatar
Real User

Cisco Nexus still needs more stability. Not that they're unstable. FlexPod in particular. My team doesn't work with that but it's owned by the server infrastructure team. It's in the UTS. They're pretty stable but every once in a while, it's not.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see more granularity.

2019-06-19T08:36:00Z
author avatar
Real User

The additional features I would like to see included in the next release is the ability to integrate routing and switching features.

2019-06-19T08:36:00Z
author avatar
Real User

We really lag on the AC infrastructure where the configuration and the changes make a difference in terms of troubleshooting. The product improves us when we see an expert and L1/L2 engineers for support. We have a dependency there. A simple configuration makes a big difference. It can create more chaos inside the network. We need to make sure when we make changes in one platform and it impacts other platforms, that the technical problems don't reach the end users. There should be better certifications. More training should be provided before we get into this product.

2019-06-19T08:36:00Z
author avatar
Real User

There is not much that needs to be improved at this stage. If it were possible to gain even more throughput and more port diversity, that can always be a benefit.

2019-06-19T08:36:00Z
author avatar
Real User

The only real feature that we are hoping would evolve at some point is multi-contexts to get into multi-tenancy type environments. We are very interested in that with the 7000s. But we didn't like all the other robustness that 7000s had that we had to pay extra for. 9000s fit our needs a little bit better, but multi-contexts would be a really good feature for organizations like us, so we can separate different tenants logically and in a more secure fashion.

2019-06-19T08:36:00Z
author avatar
Real User

Some of the DHCP features need improvement.

2019-06-19T08:36:00Z
author avatar
Real User

Currently, the platform is heavy. I would like to see a lighter platform.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see improved ISSU.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see more on-device programmability, as it seems to be lacking in this platform. The EEM has limited capabilities compared to the Catalyst 9300 series, so this can be improved. I would like to see better support for the newer front end tools, such as the DNS center.

2019-06-19T08:36:00Z
author avatar
Real User

Any problems we have with the product stems from the difficulty of connecting with other non-Cisco products. There are other products on the market which we would like to have integrated. That's when we have a real solution.

2019-06-19T08:36:00Z
author avatar
Real User

My only complaint is that not all of the ports on it are enabled from the start. We pay for twenty-six ports, and we would have to license the other ports if we want to use them. This can get expensive as you expand more.

2019-06-19T08:36:00Z
author avatar
Real User

There is always room for improvement.

2019-06-19T08:36:00Z
author avatar
Top 20Real User

I would like to see Duo directly integrated with the Nexus hardware, instead of it being through the proxies, like how Duo works today. The way it works now really irritates me. There is a lot of depth in the Nexus class, and it would help to make this more accessible to the users. We, for instance, are using them no differently than we would a Catalyst switch with VPCs. With that in mind, some of the more in-depth features would be nice to have, so having easier access to them would be beneficial.

2019-06-19T08:36:00Z
author avatar
Real User

We have uncovered things about some of the features where there is room for improvement. * There are limitations on some of the lower level 9K solutions where you can't do the same things that you would normally be able to do, like for instance the number of static maps that you can configure on it. * There are limitations between different product IDs that I do not really understand, and I don't think that there is a really good reason for.

2019-06-19T08:36:00Z
author avatar
Real User

This solution is only scalable to a degree. This is a very expensive product. Areas in which the solution have room for improvement are the interface, management, and reporting. You still have to go deep into the CLI to find issues.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see a central management solution in order to have all of the equipment in one place. Also, more documentation and more design examples would help us to reach other clients.

2019-06-19T08:36:00Z
author avatar
Real User

Enhancing the software-defined level of this solution would empower it.

2019-06-19T08:36:00Z
author avatar
Real User

There are still bugs in the system that need to be fixed. Technical support could be better.

2019-06-19T08:36:00Z
author avatar
Real User

The product could be improved with a friendlier GUI.

2019-06-19T08:36:00Z
author avatar
Real User

I would like to see better monitoring actions supported in the next release of this solution. An overview of what is going on with the system would be helpful.

2019-06-19T08:36:00Z
author avatar
Real User

Upgrade and promote catalyst switches to the Nexus, it's a lot faster.

2019-06-19T08:36:00Z
author avatar
Real User

The technical support for this solution needs to be improved.

2019-06-19T08:36:00Z
author avatar
Real User

We have encountered some software bugs.

2019-06-19T08:36:00Z
author avatar
Real User

The 9K was developed to support ACI, the software-defined data center technology. For this reason, there is no feature parity between the 9K and the 5K or 7K, which means that it is harder to position the 9K to future proof them. If a customer wants to leverage their investment for ACI in the future then it is difficult. I know that Cisco has added some Fibre Channel over Ethernet capabilities to the 9K line, but there are some other features that it does not have capabilities for. For example, virtual device context is not supported. It would be really nice to see some capabilities like that added to the 9K line so that we can position them to future-proof our customers. I understand why it is that they don't have some of the features from the older Nexus models, but we get into some scenarios where the customers need those features, and they have to go with a 7K or a 5K. Ideally, I would prefer to position a 9K if I could, to future-proof them and lead them along that path to ACI, eventually.

2019-06-19T08:36:00Z
author avatar
Real User

There are too many different model numbers and too much complexity. The Nexus 9K, for example, came from a family of twenty offerings.

2019-06-19T08:36:00Z
author avatar
Real User

In the next release of this solution, Cisco should keep trending on ease-of-use, with more human or regular language and commands. Maybe they could add some machine learning and AI integration. Ease-of-use and making things more human-readable is most important.

2019-06-19T08:36:00Z
author avatar
Real User

In future releases, it would be good to have more management on those devices. Cisco needs to provide more training.

2019-06-19T08:36:00Z
author avatar
Real User

The additional features I would like to see is X-LAN and ACI. More ACI or SDN features.

2019-06-19T08:36:00Z
author avatar
Real User

Cisco Nexus is a switch. It's fairly straightforward in what it does and what it can offer. Other than the differences between the command line or vs. Catalyst, it's just getting used to it. I don't have any negative issues. Cisco Nexus is expensive.

2019-06-19T08:36:00Z
author avatar
Top 20Real User

In the Nexus 3500, you can't do per-port Jumbo frames, so you have to enable it as a global configuration. This is a feature that should be added.

2019-06-19T08:36:00Z
author avatar
Real User

The only major improvement required would be stability. With some of the products we had before, we had a little more downtime than we would like. We had to spend more time either dealing with parts that needed to be replaced, or issues that we had in configurations that we needed to upgrade. The Cisco Nexus is a lot more stable and doesn't have all of the bugs when it has to do with upgrades. Some of the fiber optic capacity increases will be good because we're already looking at 40 GB and 100 GB at a reasonable price. Fiber capacity is going to be something we're starting to look on our roadmap, how do we increase what we have available. We use Cisco Nexus and haven't had any problems. We've been happy with it.

2019-06-19T08:36:00Z
author avatar
Consultant

In terms of the context of this deployment, Cisco Nexus did everything it needed to do. I'd like to see this be wrapped into ACI. I'll be more comfortable when it's had more deployments. There's more knowledge out there on how to configure it. The Cisco Nexus is a big change. I'm not currently looking for new features. I am looking to other customers with good experiences deploying in ACI mode.

2019-06-19T08:36:00Z
author avatar
Real User

The solution has room for improvement in terms of the learning curve.

2019-06-19T08:36:00Z
author avatar
Real User

For a very small subset, Cisco Nexus caused port flapping within the applications, which was weird. Call it an outage. It was one specific application, i.e. because of the way the application was routed through the switches which couldn't be handled that way. We had the good side because 90% of it works flawlessly. We didn't have to repeat IP everything. We didn't have to go through and take everything down. We just migrated it. But that one small subset went haywire.

2019-06-19T08:36:00Z
Learn what your peers think about Cisco Nexus. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,845 professionals have used our research since 2012.