Cisco end-of-life

Posted on 2012-08-22
Last Modified: 2012-08-23
What does it mean end-of-life for a product in Cisco term. The reason I ask is because I am looking at the the Catalyst Express 500 and it said that end-of-software maintenance is Dec2010, end-of-support is Jun2009, and end-of-life is Dec2014.
What happens between Dec2010 and Dec 2014?
Question by:biggynet
    LVL 17

    Accepted Solution

    Cisco stages the end of a product in several steps ... it starts with end of sale, at which point the product is no longer sold officially (apart from maybe stock pieces). You are still able to get new software maintenance on the products, as well as updates, replacements etc.
    At some point, only existing contracts can be extended, but no new contracts bought anymore. Yet again later, only security fixes may be integrated into the software,, and shortly after, no further support or updates are made available.
    Usually, if you search the Cisco site for EOL of a product you will receive the complete list of dates
    LVL 17

    Assisted Solution


    Author Comment

    So end-of-life is when the product is obsolete. Between Dec2010 and Dec2014, Cisco still provide supports but only for extended contract and without bug fixes. Correct?
    LVL 17

    Expert Comment

    Correct, as of Mar 17 2010, Cisco stopped doing any maintenance on the software itself, so any bugs remaining in the software are more or less "features" for the remained of its lifetime ...

    In general, it's advisable not to purchase any devices that have an EOL date announced for business environments ... in most cases, followup-products have already been on the market long enough to be considered stable (both from hard- and software POV), and usually at a similar price point ... OTOH, for non mission-critical use, getting EOS/EOL devices may be  good way to save money, as they are usually well engineered, proven pieces of hardware that will operate well beyond their official "lifetime" ... just make sure you know you're more or less on your own if anything goes wrong ...

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Suggested Solutions

    Title # Comments Views Activity
    Fortigate: setup gateway in a different segment 2 48
    USB Hub for apple devices 5 24
    IPV6 and AWS 3 24
    Link Aggregation 2 12
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now