The 5 best router and switch features you never use

An informal canvass of some leading switch and router vendors found that customers use less than half of the systems' capabilities

NetFlow, sFlow not tracking

NetFlow is a Cisco-developed method for collecting IP traffic information. This information can then be used to visualize traffic flows and traffic volume in a network to help with capacity planning, pinpoint usual or malicious behavior, billing and other tasks.

"It tells you by user, by application, what's consuming all of your network resources," says Trent Waterhouse, vice president of marketing at Enterasys.

Yet despite its promised benefits, NetFlow is the "most overlooked capability" on Enterasys switches, Waterhouse says. He adds that 17% of the company's support center calls are related to features and functionality already embedded in Enterasys switches for security or policy management.

"We don't want to be like Microsoft Word, where only 10% of our features are used," Waterhouse says. "We want to make the management software facilitate the feature usage so you get that built in priority and security protection."

Enterasys customer the University of North Carolina uses 50% of the features on its switches, says Mike Hawkins, associate director of networking at the college. Though he did not quantify the dollar savings, Hawkins says using half or more of the available switch features -- such as role-based network access policies, or remote port-based RMON packet capture, or MIBs that maintain a history of everything broadcast on a switch port -- does reduce costs for UNC via increased uptime, automated operation and decreased manpower.

"We use more of the features so we don't have to have as many people" operating and managing the network, he says.

"I know when I solve problems quicker, a user is back online quicker," Hawkins says. "How much is that user's time worth? That's the money I save. And I don't have to send anyone out into the field."

One of the capabilities UNC does not use on the Enterasys switches is flow setup throttling, which allows a user to take action -- such as slowing down traffic or shutting off a port -- on a certain number of flows on a link or port if those flows are determined suspicious or potentially malicious. Hawkins says he may use it as more video traffic traverses the UNC network.

Another traffic monitoring feature, the IETF specification sFlow, is also commonly overlooked or not enabled, vendors say. The sFlow capability captures traffic data by using a sampling technology to collect statistics from switches and routers.

Sampling makes it applicable to gigabit and higher speed networks, vendors say. And like NetFlow, it provides more granular visibility into network behavior, they say.

Yet sFlow "has a lot of benefit potential but not being fully utilized," says Mark Hilton, director of technical product marketing at HP ProCurve.

Hilton says there are a couple reasons for this: there may not be a compliance requirement or mandate from the company or governmental agency to turn up the feature; and the feature may have appealed to users when they first bought the switch, but forgot or found they didn't need to enable it.

"Unless you have a mandate or compliance issue, sometimes it's something you say you'll get to when you have time," Hilton says. "And they never quite get to that point. We have a lot of customers who say, 'We love that feature, we bought it for that,' but two years later, they haven't actually used it."

Few takers for IPv6

IPv6 -- the long-anticipated upgrade to the Internet's main protocol -- is a feature that's mandated by the U.S. government. Among other things, IPv6 promises improved network security and management. But it has been largely ignored by private-sector enterprises even though the protocol is incorporated into a switch or router's software license.

Users have found other ways to handle IPv4 address depletion, such as network address translation, vendors say.

Its lack of use is "a little bit surprising because of the cost of managing IP addresses," says Cisco's Choe. He says one reason it isn't used more is that client operating systems, like Windows Vista, provide other methods for managing IPv4 address shortages even though they incorporate IPv6.

Those that have embraced IPv6, such as Google, say implementing the technology is not that difficult and that it will pay off in easier network management.

Not that IPv6 doesn't have its shortcomings. A recent Internet Society report survey found that business incentives are lacking. Concerns remain about backward compatibility issues with IPv6 and IPv4 as well, according to the IETF.

Tags 802.1XNetworkingipv6

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jim Duffy

Network World

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?