Cisco Systems WSC2960X24PSL, WSC2960X24TDL, WSC2960X48TSL, WSC2960X24TSLL, WSC2960X24PDL Rspan Vlan

Page 86

Configuring SPAN and RSPAN

SPAN and RSPAN

configuration. If a configuration change is made to the port while it is acting as a SPAN destination port, the change does not take effect until the SPAN destination configuration had been removed.

Note When QoS is configured on the SPAN destination port, QoS takes effect immediately.

If the port was in an EtherChannel group, it is removed from the group while it is a destination port. If it was a routed port, it is no longer a routed port.

It can be any Ethernet physical port.

It cannot be a secure port.

It cannot be a source port.

It cannot be an EtherChannel group or a VLAN.

It can participate in only one SPAN session at a time (a destination port in one SPAN session cannot be a destination port for a second SPAN session).

When it is active, incoming traffic is disabled. The port does not transmit any traffic except that required for the SPAN session. Incoming traffic is never learned or forwarded on a destination port.

If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at Layer 2.

It does not participate in any of the Layer 2 protocols (STP, VTP, CDP, DTP, PagP).

A destination port that belongs to a source VLAN of any SPAN session is excluded from the source list and is not monitored.

The maximum number of destination ports in a switch or switch stack is 64.

Local SPAN and RSPAN destination ports function differently with VLAN tagging and encapsulation:

For local SPAN, if the encapsulation replicate keywords are specified for the destination port, these packets appear with the original encapsulation (untagged, ISL, or IEEE 802.1Q). If these keywords are not specified, packets appear in the untagged format. Therefore, the output of a local SPAN session with encapsulation replicate enabled can contain a mixture of untagged, ISL, or IEEE 802.1Q-tagged packets.

For RSPAN, the original VLAN ID is lost because it is overwritten by the RSPAN VLAN identification. Therefore, all packets appear on the destination port as untagged.

RSPAN VLAN

The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. RSPAN VLAN has these special characteristics:

All traffic in the RSPAN VLAN is always flooded.

No MAC address learning occurs on the RSPAN VLAN.

RSPAN VLAN traffic only flows on trunk ports.

RSPAN VLANs must be configured in VLAN configuration mode by using the remote-spanVLAN configuration mode command.

 

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

74

OL-29044-01

Image 86
Contents Americas Headquarters First Published July 10Page N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Bold font Document ConventionsConvention Description Reader Alert Conventions Obtaining Documentation and Submitting a Service Request Related DocumentationXii Information About Using the Command-Line Interface Command ModesQuit Mode Access Method Prompt Exit Method About This ModeConfigure Ctrl-ZMode Using the Help SystemCommand or Action Purpose Step HelpCLI Error Messages Understanding Abbreviated CommandsNo and default Forms of Commands Configuring the Command History How to Use the CLI to Configure FeaturesConfiguration Logging Error Message MeaningCommand or Action Changing the Command History Buffer SizeRecalling Commands Privileged Exec mode Enabling and Disabling Editing FeaturesDisabling the Command History Feature Terminal no historyEditing Commands through Keystrokes Editing Command Lines That Wrap Show more command begin include exclude regular-expression Searching and Filtering Output of show and more CommandsAccess-list Show more command begin include excludeCommand or Action Example OL-29044-01 Finding Feature Information Prerequisites for Configuring the Configuration EngineCisco Configuration Engine Software Restrictions for Configuring the Configuration EngineInformation About Configuring the Configuration Engine Related TopicsConfiguration Service Cisco Configuration Engine Architectural OverviewConfigID Event ServiceCisco Networking Services IDs and Device Hostnames NameSpace MapperHostname and DeviceID Hostname, DeviceID, and ConfigIDDeviceID Initial Configuration Cisco IOS CNS AgentsSynchronized Configuration Automated CNS ConfigurationIncremental Partial Configuration Device Required ConfigurationEnabling the CNS Event Agent How to Configure the Configuration EngineConfigure terminal EndConfigure terminal Enters the global configuration mode Reconnect-time time backupEnabling the Cisco IOS CNS Agent Cns config initial hostname ip-addressCns config partial hostname ip-address On the switch Enabling an Initial Configuration for Cisco IOS CNS AgentCommand or Action Purpose End Returns to privileged Exec modeConfigure terminal Cns template connect name Exit Hostname nameExit Returns to global configuration mode Discover controller controller-typedlciHostname string string udi event image command ExitPort-number event no-persist Source ip-address syntax-checkShow cns event connections Show cns config connectionsRefreshing DeviceIDs No cns event ip-address port-number Enabling a Partial Configuration for Cisco IOS CNS Agent Cns config partial ip-addresshostnameMonitoring CNS Configurations Command PurposeRelease Modification Additional ReferencesTechnical Assistance Description Link Cisco IOS 15.02EXInformation About CDP CDP OverviewConfiguring CDP Characteristics How to Configure CDPDefault CDP Configuration FeatureOptional Configures CDP to send Version-2 advertisements Disabling CDP Configure terminal No cdp run EndNo cdp run Disables CDP Enabling CDP Configure terminal Cdp run EndCdp run Enables CDP if it has been disabled Disabling CDP on an Interface No cdp enable EndEnters interface configuration mode Specifies the interface on which you are disabling CDPCdp enable End Enabling CDP on an InterfaceMonitoring and Maintaining CDP Cdp enable Enables CDP on a disabled interfaceCommand Description Specifies the interface on which you are enabling CDPShow cdp traffic CommandShow cdp neighbors interface-id Related Documents Related Topic Document TitleFeature History and Information for Cisco Discovery Protocol Prerequisites for Snmp Supported Snmp VersionsModel Level Authentication Encryption Result SHA Snmp Overview Restrictions for SnmpInformation About Snmp Snmp Manager FunctionsSnmp Community Strings Snmp MIB Variables AccessSnmp Agent Functions Snmp Notifications Snmp ifIndex MIB Object ValuesFeature Default Setting Default Snmp ConfigurationSnmp Configuration Guidelines Interface TypeDisabling the Snmp Agent How to Configure SnmpConfigure terminal No snmp-server End Configuring Community Strings No snmp-server Disables the Snmp agent operationSwitchconfig# access-list 4 deny any Configuring Snmp Groups and Users Snmp-server engineID localSnmp-server user username V1 is the least secure of the possible security modelsIntegers twice the normal width Configuring Snmp Notifications End ExampleNotification Type Keyword Description Port-security Snmp-server enable traps port-securitySnmp-server enable traps port-security trap-rate rate RtrV2c access access-list v3 encrypted access Snmp-server user username group-nameremoteRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Snmp-server location text Sets the system location string Limiting Tftp Servers Used Through SnmpSnmp-server contact text Sets the system contact string Monitoring Snmp Status Snmp-server tftp-server-listSnmp Examples Switchconfig# snmp-server enable traps entity Configuring Span and Rspan Prerequisites for Span and RspanRestrictions for Span and Rspan RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Local Span Information About Span and RspanSpan and Rspan Example of Local Span Configuration on a Single Device Remote SpanExample of Rspan Configuration Span and Rspan Concepts and TerminologySpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Flow-Based Span Span and Rspan and Device StacksSpan Configuration Guidelines Default Span and Rspan ConfigurationConfiguration Guidelines Fspan and Frspan Configuration Guidelines How to Configure Span and RspanRspan Configuration Guidelines Creating a Local Span SessionMonitor session sessionnumber source Both rx txEnd No monitor session sessionnumber all Local remoteCommand or Action Purpose Specifying VLANs to FilterConfiguring a Vlan as an Rspan Vlan Monitor session sessionnumber filter vlanRemote-span End Remote-spanCreating an Rspan Source Session Monitor session sessionnumber Destination remote vlan vlan-idSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configuring an Fspan Session Configure terminal Enters global configuration modeMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Show monitor Or Frspan configurationMonitoring Span and Rspan Operations Span and Rspan Configuration Examples Example Configuring Local SpanFeature History and Information for Span and Rspan Examples Creating an Rspan VlanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.