The Cisco Catalyst 9200 Series Switches better fits in production access environment, or in small server rooms, for connection end users, access points, small server or sensors. Higher series are better fitted in aggregation or core level, or maybe for small DC. FortiSwitches …
The Cisco Catalyst 9200 Series Switches are a good fit for access layer needs. Put them on the edge of your network and you will have what you need to connect a physical device to your network. I would not deploy them in places at the core of a network. They can be used in data centers as an edge connection device.
If you've got a large network and are already using FortiGate firewalls or FortiAP access points, integrating FortiSwitch Secure Access Switches makes for one integrated solution. Previously we had Cisco switches that had to be configured and managed separately, which was always prone to error. Now that we have our entire network backbone on FortiNet devices, managing and configuring them is smoother. We are now able to see much clearer if there are any configuration issues between networking devices.
We have now bought 468 switches, and we will most likely continue using this series, because it is the switch that is the cheapest for our needs. Maybe for some specific use cases, we will use the Catalyst 9300 series. Because we are more pressed on manpower, that money, we stick with what works.
The functions on Cisco Catalyst 9200 Series Switches are very responsive and its notification functions are very active and reliable in producing effective new updates on any detected data threats across the entire network flow even the network speed reports are easily presented by its alert functionalities and data analytics are impressive.
We have previously used both Cisco 220 Series and Dell PowerConnect 8000 Series switches that were managed separately from our firewalls and access points. The Cisco and Dell switch worked fine and we never had a problem with them, but it was always a hassle to have to make configuration changes since that would have to be done via separate GUIs. Having the ability to configure and manage firewalls, switches, and wireless access points all within one central GUI saves time and headache.
The positive thing is that because it has a redundant power supply, you can have users staying on for all the time. If you have a power interruption or something and you have both power supply A and B, then you're option to, you don't need users to log off or they're being cut off because you have to replace something or do something.