Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

How does ketchup and mustard relate to Cloud Monitoring for Catalyst and DNA Center?

Researcher by Researcher
November 28, 2022
in Networking
0
How does ketchup and mustard relate to Cloud Monitoring for Catalyst and DNA Center?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


My two sons have very different tastes in many things like activities, clothes, brands, food, and, more than anything, condiments! At home, we have these endless battles on whether ketchup is better than mustard or mustard than ketchup. The message to my kids is that there’s no such thing as a universal better option. There are many reasons why one would choose one over the other: food sensitivities, ingredients, nutritional value, and taste to name a few. My older son likes everything sweet and he doesn’t care too much about sugar content so ketchup is the best option for him. My younger son doesn’t like to mix sweet and savory food and also is more mindful of the nutritional value. For this reason, mustard is best for my younger son.

All this to say that, at Cisco, we strongly believe in giving choices to customers so that everyone can have the solution that works best for them. And this is also true when it comes to managing your Cisco Catalyst infrastructure. One option would be Cisco DNA Center for which I’ve written numerous blogs. In this blog, we will discuss the characteristics of the recently introduced new option: Cloud Monitoring for Catalyst with Meraki Dashboard. The purpose of these blogs is to give you enough information to make the best choice for your environment.

Related articles

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023

Meraki Dashboard can provide cloud-based monitoring for Catalyst devices and it’s a great option for numerous environments. For example, networks with Catalyst fixed configuration switches with no management platform or a legacy management platform that needs to be replaced.  Another great use case would be mixed environments with Catalyst switches and Meraki infrastructure like we see in the picture below:

Use Case Examples of Cloud Monitoring for Catalyst
Figure 1: Use Case Examples of Cloud Monitoring for Catalyst

How do you know if Cloud Monitoring is right for your environment? In the next sections we will explore the following capabilities:

  • Unified view of Cisco network infrastructure
  • Device health and troubleshooting
  • Network client and traffic information

Unified view of Cisco network infrastructure

Cisco Cloud Monitoring for Catalyst is especially interesting for environments with mixed Catalyst and Meraki devices because the Meraki dashboard can provide a unified view of the infrastructure including information like switch Up/Down status, model, version, serial number and firmware. Meraki dashboard also provides a topology view of the unified network:

Unified view of Cisco network infrastructure in topology mode
Figure 2: Unified view of Cisco network infrastructure in topology mode

Device health and troubleshooting

Meraki dashboard provides best-in-class cloud monitoring for Meraki devices and now to Catalyst devices as well.  Network administrators can monitor Catalyst connectivity and health from the dashboard, obtain real-time switch and port health, port-level packet and error counters, and alerts for switch or port issues. Catalyst devices also benefit from live troubleshooting tools, like ping and port cycle,  to help identify and correct problems remotely.

Detailed port visibility and live troubleshooting tools
Figure 3: Detailed port visibility and live troubleshooting tools

Network client and traffic information

Another very useful capability of the Meraki dashboard is that it provides visibility into the connected devices across the network and detailed network usage and traffic statistics. Meraki dashboard also provides application visibility including top users in the network and top application traffic over time.

Application Visibility
Figure 4: Application Visibility

What else do you need to know?

Besides the features and capabilities, there are a few other things you need to know to decide if this platform is the right operational choice for your environment.

  • Platform: Meraki Cloud Dashboard – SaaS
  • Capabilities: Monitoring Only (Meraki Dashboard will not configure the device)
  • Supported Devices: Catalyst Switches 9200/L,  9300/L/X and 9500
  • Switch OS: IOS-XE
  • License: DNA Essentials or DNA Advantage

Cisco Catalyst switches mentioned in the list above can be on-boarded for cloud monitoring while retaining all features and capabilities available in IOS-XE. Having said that, the Meraki dashboard will only provide visibility on those features that are available in the Meraki Dashboard. For example, a Catalyst 9300 switch, can run a container with ThousandEyes Enterprise Agent. This switch can be monitored by the Meraki dashboard for all the capabilities mentioned in this blog. It can also retain the ThousandEyes Enterprise Agent installed. However, the Meraki dashboard will not provide monitoring capabilities on ThousandEyes Enterprise Agent deployed in the switch.

For Cloud Monitoring for Catalyst, the switches retain the IOS-XE operating system and the DNA license. There’s no requirement to convert the license to a Meraki license. The switches will leverage the DNA license and both “Essentials” and “Advantage” licenses are supported.  The difference between both is that traffic analytics is only available with the “Advantage” license. All other features are available with both “Essentials” and “Advantage” licenses.

 

Essentials and Advantage Licenses
Figure 5: Essentials and Advantage Licenses

With this blog, I hope to have helped you decide your best choice for your operational platform for Catalyst infrastructure.

On that note, what’s your better choice: ketchup or mustard?

 

Want more information on cloud Monitoring for Catalyst?

 

Additional Resources

Campus & Branch Network Deployment Flexibility? We got you covered, Part 1

Witches and Switches: A New Era of Trick-or-Treating

 

Share:



Source link

Tags: CatalystCentercloudDNAketchupmonitoringmustardrelate
Share76Tweet47

Related Posts

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
0

These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the...

Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023
0

In an era where the experience is everything, digital transformation can be hard for IT organizations, creating increased operational complexity....

Cisco Catalyst 9200CX now orderable!

New Cisco Catalyst 9200CX Compact With HVDC, Cisco UPOE And mGig

February 6, 2023
0

Figure 1. Cisco Live Amsterdam 2023 Make sure your network is ready for a hybrid world where the workplace is...

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

February 2, 2023
0

There have been a lot of talks recently about the article entitled “Multidecadal variation of the Earth’s inner-core rotation”. The...

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

February 1, 2023
0

I’m excited to pack my bags to attend Cisco Live EMEA in Amsterdam next week! After a three-year hiatus, two words...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved