Cisco Systems C2960XSTACK, WSC2960X24TDL, WSC2960X48TSL, WSC2960X24PSL Configuring an Fspan Session

Page 103

Configuring SPAN and RSPAN

Configuring an FSPAN Session

 

Command or Action

Purpose

 

 

(Optional) [, -] Specifies a series or range of interfaces. Enter a space

 

 

before and after the comma; enter a space before and after the hyphen.

 

 

Enter ingress with additional keywords to enable forwarding of incoming

 

 

traffic on the destination port and to specify the encapsulation type:

 

 

dot1q vlan vlan-idForwards incoming packets with IEEE 802.1Q

 

 

encapsulation with the specified VLAN as the default VLAN.

 

 

islForwards ingress packets with ISL encapsulation.

 

 

untagged vlan vlan-idor vlan vlan-idForwards incoming

 

 

packets with untagged encapsulation type with the specified VLAN

 

 

as the default VLAN.

Step 5

end

Returns to privileged EXEC mode.

 

Example:

 

 

Switch(config)# end

 

Configuring an FSPAN Session

Beginning in privileged EXEC mode, follow these steps to create a SPAN session, specify the source (monitored) ports or VLANs and the destination (monitoring) ports, and configure FSPAN for the session.

SUMMARY STEPS

1.configure terminal

2.no monitor session {session_number all local remote}

3.monitor session session_number source {interface interface-idvlan vlan-id} [, -] [both rx tx]

4.monitor session session_number destination {interface interface-id[, -] [encapsulation replicate]}

5.monitor session session_number filter {ip ipv6 mac} access-group {access-list-numbername}

6.end

DETAILED STEPS

 

Command or Action

Purpose

Step 1

configure terminal

Enters global configuration mode.

 

Example:

 

 

Switch# configure terminal

 

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

OL-29044-01

91

Image 103
Contents First Published July 10 Americas HeadquartersPage N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Convention Description Document ConventionsBold font Reader Alert Conventions Related Documentation Obtaining Documentation and Submitting a Service RequestXii Command Modes Information About Using the Command-Line InterfaceCtrl-Z Mode Access Method Prompt Exit Method About This ModeConfigure QuitHelp Using the Help SystemCommand or Action Purpose Step ModeNo and default Forms of Commands Understanding Abbreviated CommandsCLI Error Messages Error Message Meaning How to Use the CLI to Configure FeaturesConfiguration Logging Configuring the Command HistoryRecalling Commands Changing the Command History Buffer SizeCommand or Action Terminal no history Enabling and Disabling Editing FeaturesDisabling the Command History Feature Privileged Exec modeEditing Commands through Keystrokes Editing Command Lines That Wrap Show more command begin include exclude Searching and Filtering Output of show and more CommandsAccess-list Show more command begin include exclude regular-expressionCommand or Action Example OL-29044-01 Prerequisites for Configuring the Configuration Engine Finding Feature InformationRelated Topics Restrictions for Configuring the Configuration EngineInformation About Configuring the Configuration Engine Cisco Configuration Engine SoftwareCisco Configuration Engine Architectural Overview Configuration ServiceNameSpace Mapper Event ServiceCisco Networking Services IDs and Device Hostnames ConfigIDDeviceID Hostname, DeviceID, and ConfigIDHostname and DeviceID Cisco IOS CNS Agents Initial ConfigurationDevice Required Configuration Automated CNS ConfigurationIncremental Partial Configuration Synchronized ConfigurationEnd How to Configure the Configuration EngineConfigure terminal Enabling the CNS Event AgentReconnect-time time backup Configure terminal Enters the global configuration modeCns config partial hostname ip-address Cns config initial hostname ip-addressEnabling the Cisco IOS CNS Agent End Returns to privileged Exec mode Enabling an Initial Configuration for Cisco IOS CNS AgentCommand or Action Purpose On the switchExit Hostname name Configure terminal Cns template connect nameDiscover controller controller-typedlci Exit Returns to global configuration modeExit Hostname string string udi event image commandSource ip-address syntax-check Port-number event no-persistRefreshing DeviceIDs Show cns config connectionsShow cns event connections No cns event ip-address port-number Cns config partial ip-addresshostname Enabling a Partial Configuration for Cisco IOS CNS AgentCommand Purpose Monitoring CNS ConfigurationsCisco IOS 15.02EX Additional ReferencesTechnical Assistance Description Link Release ModificationCDP Overview Information About CDPFeature How to Configure CDPDefault CDP Configuration Configuring CDP CharacteristicsOptional Configures CDP to send Version-2 advertisements No cdp run Disables CDP Configure terminal No cdp run EndDisabling CDP Cdp run Enables CDP if it has been disabled Configure terminal Cdp run EndEnabling CDP Specifies the interface on which you are disabling CDP No cdp enable EndEnters interface configuration mode Disabling CDP on an InterfaceEnabling CDP on an Interface Cdp enable EndSpecifies the interface on which you are enabling CDP Cdp enable Enables CDP on a disabled interfaceCommand Description Monitoring and Maintaining CDPRelated Documents Related Topic Document Title CommandShow cdp neighbors interface-id Show cdp trafficFeature History and Information for Cisco Discovery Protocol Supported Snmp Versions Prerequisites for SnmpModel Level Authentication Encryption Result SHA Snmp Manager Functions Restrictions for SnmpInformation About Snmp Snmp OverviewSnmp Agent Functions Snmp MIB Variables AccessSnmp Community Strings Snmp ifIndex MIB Object Values Snmp NotificationsInterface Type Default Snmp ConfigurationSnmp Configuration Guidelines Feature Default SettingConfigure terminal No snmp-server End How to Configure SnmpDisabling the Snmp Agent No snmp-server Disables the Snmp agent operation Configuring Community StringsSwitchconfig# access-list 4 deny any Snmp-server engineID local Configuring Snmp Groups and UsersIntegers twice the normal width V1 is the least secure of the possible security modelsSnmp-server user username End Example Configuring Snmp NotificationsNotification Type Keyword Description Rtr Snmp-server enable traps port-securitySnmp-server enable traps port-security trap-rate rate Port-securitySnmp-server user username group-nameremote V2c access access-list v3 encrypted accessRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Snmp-server contact text Sets the system contact string Limiting Tftp Servers Used Through SnmpSnmp-server location text Sets the system location string Snmp-server tftp-server-list Monitoring Snmp StatusSnmp Examples Switchconfig# snmp-server enable traps entity Prerequisites for Span and Rspan Configuring Span and RspanRspan Restrictions for Span and RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Span and Rspan Information About Span and RspanLocal Span Remote Span Example of Local Span Configuration on a Single DeviceSpan and Rspan Concepts and Terminology Example of Rspan ConfigurationSpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Span and Rspan and Device Stacks Flow-Based SpanConfiguration Guidelines Default Span and Rspan ConfigurationSpan Configuration Guidelines Creating a Local Span Session How to Configure Span and RspanRspan Configuration Guidelines Fspan and Frspan Configuration GuidelinesBoth rx tx Monitor session sessionnumber sourceEnd Local remote No monitor session sessionnumber allSpecifying VLANs to Filter Command or Action PurposeMonitor session sessionnumber filter vlan Configuring a Vlan as an Rspan VlanRemote-span Remote-span EndCreating an Rspan Source Session Destination remote vlan vlan-id Monitor session sessionnumberSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configure terminal Enters global configuration mode Configuring an Fspan SessionMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Monitoring Span and Rspan Operations Or Frspan configurationShow monitor Example Configuring Local Span Span and Rspan Configuration ExamplesExamples Creating an Rspan Vlan Feature History and Information for Span and RspanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.