Cisco Systems WSC2960X24TDL, WSC2960X48TSL, WSC2960X24PSL, WSC2960X24TSLL, C2960XSTACK Source Ports

Page 84

Configuring SPAN and RSPAN

SPAN and RSPAN

BothIn a SPAN session, you can also monitor a port or VLAN for both received and sent packets. This is the default.

The default configuration for local SPAN session ports is to send all packets untagged. SPAN also does not normally monitor bridge protocol data unit (BPDU) packets and Layer 2 protocols, such as Cisco Discovery Protocol (CDP), VLAN Trunk Protocol (VTP), Dynamic Trunking Protocol (DTP), Spanning Tree Protocol (STP), and Port Aggregation Protocol (PAgP). However, when you enter the encapsulation replicate keywords when configuring a destination port, these changes occur:

Packets are sent on the destination port with the same encapsulation (untagged, Inter-Switch Link (ISL), or IEEE 802.1Q) that they had on the source port.

Packets of all types, including BPDU and Layer 2 protocol packets, are monitored.

Therefore, a local SPAN session with encapsulation replicate enabled can have a mixture of untagged, ISL, and IEEE 802.1Q tagged packets appear on the destination port.

Switch congestion can cause packets to be dropped at ingress source ports, egress source ports, or SPAN destination ports. In general, these characteristics are independent of one another. For example:

A packet might be forwarded normally but dropped from monitoring due to an oversubscribed SPAN destination port.

An ingress packet might be dropped from normal forwarding, but still appear on the SPAN destination port.

An egress packet dropped because of switch congestion is also dropped from egress SPAN.

In some SPAN configurations, multiple copies of the same source packet are sent to the SPAN destination port. For example, a bidirectional (both Rx and Tx) SPAN session is configured for the Rx monitor on port A and Tx monitor on port B. If a packet enters the switch through port A and is switched to port B, both incoming and outgoing packets are sent to the destination port. Both packets are the same unless a Layer 3 rewrite occurs, in which case the packets are different because of the packet modification.

Source Ports

A source port (also called a monitored port) is a switched or routed port that you monitor for network traffic analysis. In a local SPAN session or RSPAN source session, you can monitor source ports or VLANs for traffic in one or both directions. The switch supports any number of source ports (up to the maximum number of available ports on the switch) and any number of source VLANs (up to the maximum number of VLANs supported). However, the switch supports a maximum of (local or RSPAN) with source ports or VLANs. You cannot mix ports and VLANs in a single session.

A source port has these characteristics:

It can be monitored in multiple SPAN sessions.

Each source port can be configured with a direction (ingress, egress, or both) to monitor.

It can be any port type (for example, EtherChannel, Gigabit Ethernet, and so forth).

For EtherChannel sources, you can monitor traffic for the entire EtherChannel or individually on a physical port as it participates in the port channel.

It can be an access port, trunk port, routed port, or voice VLAN port.

It cannot be a destination port.

 

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

72

OL-29044-01

Image 84
Contents Americas Headquarters First Published July 10Page N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Document Conventions Convention DescriptionBold font Reader Alert Conventions Obtaining Documentation and Submitting a Service Request Related DocumentationXii Information About Using the Command-Line Interface Command ModesMode Access Method Prompt Exit Method About This Mode ConfigureQuit Ctrl-ZUsing the Help System Command or Action Purpose StepMode HelpUnderstanding Abbreviated Commands No and default Forms of CommandsCLI Error Messages How to Use the CLI to Configure Features Configuration LoggingConfiguring the Command History Error Message MeaningChanging the Command History Buffer Size Recalling CommandsCommand or Action Enabling and Disabling Editing Features Disabling the Command History FeaturePrivileged Exec mode Terminal no historyEditing Commands through Keystrokes Editing Command Lines That Wrap Searching and Filtering Output of show and more Commands Access-listShow more command begin include exclude regular-expression Show more command begin include excludeCommand or Action Example OL-29044-01 Finding Feature Information Prerequisites for Configuring the Configuration EngineRestrictions for Configuring the Configuration Engine Information About Configuring the Configuration EngineCisco Configuration Engine Software Related TopicsConfiguration Service Cisco Configuration Engine Architectural OverviewEvent Service Cisco Networking Services IDs and Device HostnamesConfigID NameSpace MapperHostname, DeviceID, and ConfigID DeviceIDHostname and DeviceID Initial Configuration Cisco IOS CNS AgentsAutomated CNS Configuration Incremental Partial ConfigurationSynchronized Configuration Device Required ConfigurationHow to Configure the Configuration Engine Configure terminalEnabling the CNS Event Agent EndConfigure terminal Enters the global configuration mode Reconnect-time time backupCns config initial hostname ip-address Cns config partial hostname ip-addressEnabling the Cisco IOS CNS Agent Enabling an Initial Configuration for Cisco IOS CNS Agent Command or Action PurposeOn the switch End Returns to privileged Exec modeConfigure terminal Cns template connect name Exit Hostname nameExit Returns to global configuration mode Discover controller controller-typedlciHostname string string udi event image command ExitPort-number event no-persist Source ip-address syntax-checkShow cns config connections Refreshing DeviceIDsShow cns event connections No cns event ip-address port-number Enabling a Partial Configuration for Cisco IOS CNS Agent Cns config partial ip-addresshostnameMonitoring CNS Configurations Command PurposeAdditional References Technical Assistance Description LinkRelease Modification Cisco IOS 15.02EXInformation About CDP CDP OverviewHow to Configure CDP Default CDP ConfigurationConfiguring CDP Characteristics FeatureOptional Configures CDP to send Version-2 advertisements Configure terminal No cdp run End No cdp run Disables CDPDisabling CDP Configure terminal Cdp run End Cdp run Enables CDP if it has been disabledEnabling CDP No cdp enable End Enters interface configuration modeDisabling CDP on an Interface Specifies the interface on which you are disabling CDPCdp enable End Enabling CDP on an InterfaceCdp enable Enables CDP on a disabled interface Command DescriptionMonitoring and Maintaining CDP Specifies the interface on which you are enabling CDPCommand Show cdp neighbors interface-idShow cdp traffic Related Documents Related Topic Document TitleFeature History and Information for Cisco Discovery Protocol Prerequisites for Snmp Supported Snmp VersionsModel Level Authentication Encryption Result SHA Restrictions for Snmp Information About SnmpSnmp Overview Snmp Manager FunctionsSnmp MIB Variables Access Snmp Agent FunctionsSnmp Community Strings Snmp Notifications Snmp ifIndex MIB Object ValuesDefault Snmp Configuration Snmp Configuration GuidelinesFeature Default Setting Interface TypeHow to Configure Snmp Configure terminal No snmp-server EndDisabling the Snmp Agent Configuring Community Strings No snmp-server Disables the Snmp agent operationSwitchconfig# access-list 4 deny any Configuring Snmp Groups and Users Snmp-server engineID localV1 is the least secure of the possible security models Integers twice the normal widthSnmp-server user username Configuring Snmp Notifications End ExampleNotification Type Keyword Description Snmp-server enable traps port-security Snmp-server enable traps port-security trap-rate ratePort-security RtrV2c access access-list v3 encrypted access Snmp-server user username group-nameremoteRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Limiting Tftp Servers Used Through Snmp Snmp-server contact text Sets the system contact stringSnmp-server location text Sets the system location string Monitoring Snmp Status Snmp-server tftp-server-listSnmp Examples Switchconfig# snmp-server enable traps entity Configuring Span and Rspan Prerequisites for Span and RspanRestrictions for Span and Rspan RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Information About Span and Rspan Span and RspanLocal Span Example of Local Span Configuration on a Single Device Remote SpanExample of Rspan Configuration Span and Rspan Concepts and TerminologySpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Flow-Based Span Span and Rspan and Device StacksDefault Span and Rspan Configuration Configuration GuidelinesSpan Configuration Guidelines How to Configure Span and Rspan Rspan Configuration GuidelinesFspan and Frspan Configuration Guidelines Creating a Local Span SessionMonitor session sessionnumber source Both rx txEnd No monitor session sessionnumber all Local remoteCommand or Action Purpose Specifying VLANs to FilterConfiguring a Vlan as an Rspan Vlan Monitor session sessionnumber filter vlanRemote-span End Remote-spanCreating an Rspan Source Session Monitor session sessionnumber Destination remote vlan vlan-idSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configuring an Fspan Session Configure terminal Enters global configuration modeMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Or Frspan configuration Monitoring Span and Rspan OperationsShow monitor Span and Rspan Configuration Examples Example Configuring Local SpanFeature History and Information for Span and Rspan Examples Creating an Rspan VlanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.