Extreme Networks acquires Enterasys – Comparison

Its official, Extreme Networks has acquired Enterasys Networks. We have lots of Enterasys gear, so we were highly interested to know the path that would be taken after the acquisition. At first, I couldn’t help think if the acquisition was a play for Enterasys patents. However, that’s just pure speculation. We were informed by product management that all existing products would continue to follow the current end of support and end of life cycle, so that’s good news.

Overall, I think that the acquisition will be pretty positive. The current Extreme Networks profile was missing things that Enterasys offered such as their highly customized L2-L4 policy and NAC integration. Extreme also looks like they OEM Motorola wireless and Enterasys has their own wireless portfolio.

The biggest plus will be the extension of the switching/routing lineup. Enterasys had a small gap in their WAN solution. We discovered this when we were looking for a smaller port density WAN 1-10G BGP/OSPF capable router. Extreme networks fills that gap and I’m sure there are many more compliments that I haven’t mentioned.

Extreme Networks overview

The Summit x460 series would have fit the ticket as a smaller device we were looking for when we were planning to replace our old Juniper M7i tank. However, we ended up purchasing a few brocade icx-6610’s. This was a few months back before we heard of the acquisition.

Here’s the lineup of what the current offering looks like from a few vendors that would have meet our requirements at that time:

Vendor

Extreme Summit x460

Brocade icx-6610

Enterasys SSA

10/100/100BASE-T Ports

24 or 48

24 or 48

48

Max 10G

2 or 4 or 6 total (modules)

8 total (lic to unlock)

4

40G

2(summit stacking module)

4(stacking only)

na

Form Factor

Fixed/1RU

Fixed/1RU

Fixed/1RU

Stacking Support

yes

yes

yes

Redundant power

yes/hot swap

yes/hot swap

yes/hot swap

Routing – BGP4

yes (lic to unlock)

yes(lic to unlock)

yes(lic to unlock)

Each vendor may have more of a product lineup, for instance Enterasys does have a 1-Slot chassis S-Series that can provide more options. However we were trying to keep costs down and the move up to the 1-slot chassis increases costs. There are other vendors out there such as juniper, HP, and dell as well. Each has its ups and downs. The Enterasys SSA is built with custom ASICs and some other vendors typically carry the Broadcom chipset. Switching capacity was left out due to the fact that each vendor spec sheet may not compare equally. You can find more details with the links provided below:

http://www.enterasys.com/company/literature/s-ds.pdf

http://www.brocade.com/products/all/switches/product-details/icx-6610-switch/specifications.page

http://www.extremenetworks.com/libraries/products/MSComparisonChart_1636.pdf

Brocade ICX 6610 – enabling ssh and a few other things…Part 2

It seems that this is one of the more popular posts, so I’ve compiled some more useful commands that can be used on the brocade ICX 6610. You can view my original brocade icx-6610 post here.

Here are a few pictures of an ICX multilayer switch. The 24 port version, ICX 6610-24 has 8 sfp+ and 24 10/100/1000 ports in the front. You also have an out of band ethernet port and your serial port in the front as well. In order to use some of the advanced features, you will need to purchase and apply additional lic’s.
brocade-icx-6610-front.jpg

In the rear of the 6610 series, you have 4 40Gbps stacking ports. You also have 2 power supply slots and 2 fan slots. They are redundant and hot-swappable. Depending on which power/fan option you buy, you could reverse the air flow.
brocade-icx-6610-rear.jpg

Now back to the good stuff.

Use the following command to run a cable test from the brocade icx6610:
phy cable-diag tdr 1/1/1

Then run the following command to see the results of your test
show cable-diag tdr 1/1/1

The next set of commands will allow you to run optical diagnostics on your fiber mini gbic’s.
Note: You must be using brocade optics or optics that are brocade compatible to run the optical diagnostics commands.

First, run the following command in config mode to enable optical monitoring:
(config)# opical-monitor

Then run the next command with the proper port number:
show optic stackid/slot/port

Show port counters:
show statistics ethernet stackid/slot/port

Show additional stats, such as packets queued or dropped:
show interface ethernet stackid/slot/port

Brocade, Enterasys, Juniper Brainstorm Lab Gen up

Brain storming is something that you should do quite often. Find a whiteboard and start drawing. Even a piece of paper will do. Get others involved in your brainstorm. Developing new services or improving upon existing services will greatly benefit from this. We can’t be content with the “if its not broken, then don’t fix it” mentality.

With that said, here’s a diagram that came from a brainstorm/whiteboard session. This came out of my lab gen to replace our aging Juniper m7i with some Brocade icx 6610’s. There’s an old school Enterasys DFE in there as well that simulated our building distribution router.

WAN

 

@jhazesnooty

 

Brocade ICX 6610 – enabling ssh and a few other things…

After an exhaustive search of a WAN switch, we finally made our minds up to go with the brocade ICX series. We are primarily an enterasys extreme networks shop, but we are on a budget, like most other public education institutions. In my experience, I have seen many shops stick to what they know, cough, cough cisco, but is that always going to be the best price/solution? The brocade command line is very similar to cisco, so for you peep’s out there looking for an alternative to cisco, take a look at the brocade ICX lineup.

Now on to the good stuff. I’ve listed a few pointers to get ssh properly setup on an ICX 6610. You can also view more icx 6610 commands in my brocade ICX 6610 part 2 article.

//This command enables ssh on the icx 6610
(config)#crypto key generate dsa
//We can then setup a local account to use for ssh, but we first want to mask passwords
(config)#enable user password-masking
(config)#username yourusername password
//The next command enables the brocade to use the local user for ssh login
(config)#aaa authentication login default local
//We can then further secure by which IP’s are allowed to ssh
(config)#ip ssh client yourclientip
//Here is how we disable ssh.
(config)#crypto key zeroize dsa

Thanks,

@jhazesnooty