Yes, it's good in some areas, but not everybody has so much money to have real Cisco at home :-) and just because a lot of people use something doesn't mean that it's a good product.
Good security? securityfocus.com provide different view. Too much bugs in their IOS. But ok, a lot of people is ok with that. Based on BSD..... "Please take note of our Who uses it page, which list just some of the vendors who incorporate OpenSSH into their own products -- as a critically important security / access feature -- instead of writing their own SSH implementation or purchasing one from another vendor. This list specifically includes companies like Cisco, Juniper, Apple, Red Hat, and Novell; but probably includes almost all router, switch or unix-like operating system vendors. In the 10 years since the inception of the OpenSSH project, these companies have contributed not even a dime of thanks in support of the OpenSSH project (despite numerous requests)." This is "funny" too : > > Check that you are not tagging the incoming traffic as vlan > 301. The ports need to be in trunk mode. > It so funny that you should mention this, yesterday we had a 7 hour outage due to our Cisco 6506 failing to route anything on our network. It took Cisco engineers 5 of those 7 hours to restore service. Once everything was back up and running I noticed that the port that I configured for VLAN 301 was the native VLAN on the Cisco trunk and thus was not tagged. Even the Cisco guys didn't notice this. I think everything should work fine now but I haven't gotten back to working on it because I have several hundred RT tickets to attend to this morning due to the outage. ;( Sorry for the noise and thanks for the help guys. But I understand your point of view. Not everybody is same in any area. Regards -- This message posted from opensolaris.org