<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: EXOS or VOSS in Network Architecture &amp; Design</title>
    <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13090#M494</link>
    <description>It´s about 50 switches, I Would like to use VOSS because the mgmt interface is the same as legacy ERS that which is the customer network, plus all the benefits of SPB network. But I see problem in the work day because the administration grows (each VSP is standalone).</description>
    <pubDate>Thu, 25 Aug 2022 12:52:00 GMT</pubDate>
    <dc:creator>EF</dc:creator>
    <dc:date>2022-08-25T12:52:00Z</dc:date>
    <item>
      <title>EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13088#M492</link>
      <description>Hi team!!!&lt;BR /&gt;&lt;BR /&gt;I have a new deployment with universal hardware switches, now we have to take a decision about the architecture:&lt;BR /&gt;&lt;BR /&gt;- tradicional stacks with EXOS?&lt;BR /&gt;- flexibility SPB cloud with standalon devices?&lt;BR /&gt;&lt;BR /&gt;Im confused about why SPB devices can´t work on stack, and maybe this is a problem for a customers that works with Nortel/Avaya ERS legacy stacks because the number of mgmt IPs grow, but in the other hand with SPB they will have more flexibility and more fault tolereance.&lt;BR /&gt;&lt;BR /&gt;Is there any document with pros and cons? Comparative whitepaper?&lt;BR /&gt;&lt;BR /&gt;what is your opinon?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;EF</description>
      <pubDate>Thu, 25 Aug 2022 11:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13088#M492</guid>
      <dc:creator>EF</dc:creator>
      <dc:date>2022-08-25T11:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13089#M493</link>
      <description>It depends. You want to use fabric? Use VOSS. Traditional/normal networking? EXOS.&lt;BR /&gt;What are the planned core-switches? How big is the networks / how many switches are planned?</description>
      <pubDate>Thu, 25 Aug 2022 12:28:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13089#M493</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2022-08-25T12:28:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13090#M494</link>
      <description>It´s about 50 switches, I Would like to use VOSS because the mgmt interface is the same as legacy ERS that which is the customer network, plus all the benefits of SPB network. But I see problem in the work day because the administration grows (each VSP is standalone).</description>
      <pubDate>Thu, 25 Aug 2022 12:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13090#M494</guid>
      <dc:creator>EF</dc:creator>
      <dc:date>2022-08-25T12:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13091#M495</link>
      <description>Hello EF,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You should discuss with the customer and his network team.&amp;nbsp;&lt;BR /&gt;From my point of view, it depend on what you want to connect on devices which level of redundanc you want.&amp;nbsp;&lt;BR /&gt;For user access device (edge) -&amp;gt; Stack of EXOS&lt;BR /&gt;For server or all double link device -&amp;gt; VOSS and vIST cluster&lt;BR /&gt;For Core device -&amp;gt; VOSS Fabric SPBm (vIST cluster if required)&lt;BR /&gt;&lt;BR /&gt;about pros/cons, i don't see any document about it.&amp;nbsp;&lt;BR /&gt;My opinion :&lt;BR /&gt;VOSS was created for core device, not for access. They add layer 2 protection and some access mecanisme to VOSS recently but in front of XOS, i found that XOS offert better control and security option. And you can use Fabric Attach to expend the fabric. &lt;BR /&gt;I understand that the GUI is not EDM BOSS/VOSS but XOS Chalet do the job.&lt;BR /&gt;With VOSS at the Edge, it will be more flexible (under condition that you have more fiber links) but it can be more harder to admin it for IT team. If GUI is important for your customer, it sound like they are not familiar with automation tools. And if they need to repeat each modifications on each node through the GUI, they will regret the stack option.&amp;nbsp;&lt;BR /&gt;This is why you should discuss with your customer to understand their methodes, if they are open to change, automation, XIQ, etc..&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Regards,&amp;nbsp;&lt;BR /&gt;Théo&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Aug 2022 18:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13091#M495</guid>
      <dc:creator>TQU</dc:creator>
      <dc:date>2022-08-25T18:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13092#M496</link>
      <description>It is no longer true that VOSS is only for the core, in the past year and a half, since release VOSS8.3 and 8.4, VOSS has taken on all the necessary edge/access features, in particular around NAC and auto-sense.&lt;BR /&gt;There was a decision to fully automate not only the fabric forming, but also the access port configuration, and this is achieved via the new auto-sense capability which, if in particular if deployed with NAC, now allows complete zero touch of the fabric edge.&lt;BR /&gt;&lt;BR /&gt;Stacking is an old concept, and delivers a clear benefit when weighing the need to configure the wiring closet switches. It is clearly easier to configure a stack of 8 units, than it would be to configure those 8 units individually.&lt;BR /&gt;But if you have a solution where you don't need to configure the wiring closet switches anymore, then where's the value of stacking ?&lt;BR /&gt;&lt;BR /&gt;Besides, stacking is not simple, there is a lot of software complexity under the bonnet to make stacks work, and that inevitably translates in some downsides: setting up the stack to start with is a pain; stack failures are rare but can happen and are a pain to troubleshoot/correct; upgrading a stack usually takes out all the units at once; and a stack usually requires uplinks into an MLAG distribution layer, which obviously needs provisioning upfront.&lt;BR /&gt;&lt;BR /&gt;Fabric edge is a new way of designing networks, and goes hand in hand with the auto-sense functionality, and does away with stacking.&lt;BR /&gt;It also does away with requiring an MLAG distribution. And there are no more constraints on how to wire up the wiring closet. If you want to wire it up as in the stacking days, you can, but if you want to have more diverse wiring topology, you can have one wiring closet connect to the next one, in a ring like topology; or you could have a triangular distribution with wiring closets dual homed into each side of the triangle. The flexibility is the key.</description>
      <pubDate>Fri, 26 Aug 2022 15:58:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/13092#M496</guid>
      <dc:creator>Ludovico_Steven</dc:creator>
      <dc:date>2022-08-26T15:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/93364#M2714</link>
      <description>&lt;P&gt;Generally I'd stay away from stacking with EXOS. We've moved away since we never stopped seeing temporary loops and all sorts of weird behaviour despite cases and "fixes". It seems the backup is very eager to take over from the primary as the primary goes down for a stack reboot so it starts enabling interfaces that the master had brought down just before it reboots itself. ELRP goes BOOM all over the network when this happens. Customers are moving to MLAG in dist and single switches in access because of this (and other weirdness in stacks).&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 17:29:42 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/93364#M2714</guid>
      <dc:creator>FredrikB-NN</dc:creator>
      <dc:date>2022-10-15T17:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: RE: EXOS or VOSS</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/94266#M2717</link>
      <description>&lt;P&gt;Very interesting read.&lt;/P&gt;&lt;P&gt;I do not totally agree. I am not a fan of auto-sense. Auto-sense makes things just work, which is contrary to security, where you only want things to work that you explicitly configure.&lt;/P&gt;&lt;P&gt;I think it is ok for NNIs and during onboarding stage. I would even revert NNIs to static using "no auto-sense enable convert-to-config" after that. For example: In case IS-IS adjacency fails for whatever reason (configuration error or software failure), both ends of the connection might be going into NNI-ONBOARDING state and create a nice broadcast storm.&lt;/P&gt;&lt;P&gt;In any case, you should take care to separate your onboarding VLAN/service from any user/management traffic as anyone would potentially be able to connect to that service.&lt;/P&gt;&lt;P&gt;Furthermore, I'm not sure about feature parity. You can't run macros/policy, like enabling LLDP when a phone has been authorized (by NAC). (Not the other way round, which would be enabling Voice TLVs when someone _claims_ to be a phone.) Not being able to do this for example prevents you from having multiple voice networks, very common in a multi-tenant scenario, which is what fabric architecture is made for I guess. (Hint: Being able to set LLDP voice vlan using "Extreme-Dynamic-Config" Radius attrs would be spot-on &amp;lt;-- Feature request.)&lt;/P&gt;&lt;P&gt;Also, session QoS cannot be configured nicely from within XIQ(-SE at least). It just says it's not supported and you have to go manually fiddle with ACEs and set them through Radius.&lt;/P&gt;&lt;P&gt;I agree about the advantages concerning topology, even though every single switch having its own IP address is somewhat hard to digest...&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 17:21:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/exos-or-voss/m-p/94266#M2717</guid>
      <dc:creator>jeronimo</dc:creator>
      <dc:date>2023-01-03T17:21:28Z</dc:date>
    </item>
  </channel>
</rss>

