Cisco Systems WSC2960X24TSLL, WSC2960X24TDL manual Span and Rspan Interaction with Other Features

Page 87

Configuring SPAN and RSPAN

SPAN and RSPAN

STP can run on RSPAN VLAN trunks but not on SPAN destination ports.

An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.

For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the extended VLAN range (1006 to 4094), you must manually configure all intermediate switches.

It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN VLAN ID separates the sessions.

SPAN and RSPAN Interaction with Other Features

SPAN interacts with these features:

RoutingSPAN does not monitor routed traffic. VSPAN only monitors traffic that enters or exits the switch, not traffic that is routed between VLANs. For example, if a VLAN is being Rx-monitored and the switch routes traffic from another VLAN to the monitored VLAN, that traffic is not monitored and not received on the SPAN destination port.

STPA destination port does not participate in STP while its SPAN or RSPAN session is active. The destination port can participate in STP after the SPAN or RSPAN session is disabled. On a source port, SPAN does not affect the STP status. STP can be active on trunk ports carrying an RSPAN VLAN.

CDPA SPAN destination port does not participate in CDP while the SPAN session is active. After the SPAN session is disabled, the port again participates in CDP.

VTPYou can use VTP to prune an RSPAN VLAN between switches.

VLAN and trunkingYou can modify VLAN membership or trunk settings for source or destination ports at any time. However, changes in VLAN membership or trunk settings for a destination port do not take effect until you remove the SPAN destination configuration. Changes in VLAN membership or trunk settings for a source port immediately take effect, and the respective SPAN sessions automatically adjust accordingly.

EtherChannelYou can configure an EtherChannel group as a source port but not as a SPAN destination port. When a group is configured as a SPAN source, the entire group is monitored.

If a physical port is added to a monitored EtherChannel group, the new port is added to the SPAN source port list. If a port is removed from a monitored EtherChannel group, it is automatically removed from the source port list.

A physical port that belongs to an EtherChannel group can be configured as a SPAN source port and still be a part of the EtherChannel. In this case, data from the physical port is monitored as it participates in the EtherChannel. However, if a physical port that belongs to an EtherChannel group is configured as a SPAN destination, it is removed from the group. After the port is removed from the SPAN session, it rejoins the EtherChannel group. Ports removed from an EtherChannel group remain members of the group, but they are in the inactive or suspended state.

If a physical port that belongs to an EtherChannel group is a destination port and the EtherChannel group is a source, the port is removed from the EtherChannel group and from the list of monitored ports.

Multicast traffic can be monitored. For egress and ingress port monitoring, only a single unedited packet is sent to the SPAN destination port. It does not reflect the number of times the multicast packet is sent.

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

OL-29044-01

75

Image 87
Contents First Published July 10 Americas HeadquartersPage N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Document Conventions Convention DescriptionBold font Reader Alert Conventions Related Documentation Obtaining Documentation and Submitting a Service RequestXii Command Modes Information About Using the Command-Line InterfaceCtrl-Z Mode Access Method Prompt Exit Method About This ModeConfigure QuitHelp Using the Help SystemCommand or Action Purpose Step ModeUnderstanding Abbreviated Commands No and default Forms of CommandsCLI Error Messages Error Message Meaning How to Use the CLI to Configure FeaturesConfiguration Logging Configuring the Command HistoryChanging the Command History Buffer Size Recalling CommandsCommand or Action Terminal no history Enabling and Disabling Editing FeaturesDisabling the Command History Feature Privileged Exec modeEditing Commands through Keystrokes Editing Command Lines That Wrap Show more command begin include exclude Searching and Filtering Output of show and more CommandsAccess-list Show more command begin include exclude regular-expressionCommand or Action Example OL-29044-01 Prerequisites for Configuring the Configuration Engine Finding Feature InformationRelated Topics Restrictions for Configuring the Configuration EngineInformation About Configuring the Configuration Engine Cisco Configuration Engine SoftwareCisco Configuration Engine Architectural Overview Configuration ServiceNameSpace Mapper Event ServiceCisco Networking Services IDs and Device Hostnames ConfigIDHostname, DeviceID, and ConfigID DeviceIDHostname and DeviceID Cisco IOS CNS Agents Initial ConfigurationDevice Required Configuration Automated CNS ConfigurationIncremental Partial Configuration Synchronized ConfigurationEnd How to Configure the Configuration EngineConfigure terminal Enabling the CNS Event AgentReconnect-time time backup Configure terminal Enters the global configuration modeCns config initial hostname ip-address Cns config partial hostname ip-addressEnabling the Cisco IOS CNS Agent End Returns to privileged Exec mode Enabling an Initial Configuration for Cisco IOS CNS AgentCommand or Action Purpose On the switchExit Hostname name Configure terminal Cns template connect nameDiscover controller controller-typedlci Exit Returns to global configuration modeExit Hostname string string udi event image commandSource ip-address syntax-check Port-number event no-persistShow cns config connections Refreshing DeviceIDsShow cns event connections No cns event ip-address port-number Cns config partial ip-addresshostname Enabling a Partial Configuration for Cisco IOS CNS AgentCommand Purpose Monitoring CNS ConfigurationsCisco IOS 15.02EX Additional ReferencesTechnical Assistance Description Link Release ModificationCDP Overview Information About CDPFeature How to Configure CDPDefault CDP Configuration Configuring CDP CharacteristicsOptional Configures CDP to send Version-2 advertisements Configure terminal No cdp run End No cdp run Disables CDPDisabling CDP Configure terminal Cdp run End Cdp run Enables CDP if it has been disabledEnabling CDP Specifies the interface on which you are disabling CDP No cdp enable EndEnters interface configuration mode Disabling CDP on an InterfaceEnabling CDP on an Interface Cdp enable EndSpecifies the interface on which you are enabling CDP Cdp enable Enables CDP on a disabled interfaceCommand Description Monitoring and Maintaining CDPRelated Documents Related Topic Document Title CommandShow cdp neighbors interface-id Show cdp trafficFeature History and Information for Cisco Discovery Protocol Supported Snmp Versions Prerequisites for SnmpModel Level Authentication Encryption Result SHA Snmp Manager Functions Restrictions for SnmpInformation About Snmp Snmp OverviewSnmp MIB Variables Access Snmp Agent FunctionsSnmp Community Strings Snmp ifIndex MIB Object Values Snmp NotificationsInterface Type Default Snmp ConfigurationSnmp Configuration Guidelines Feature Default SettingHow to Configure Snmp Configure terminal No snmp-server EndDisabling the Snmp Agent No snmp-server Disables the Snmp agent operation Configuring Community StringsSwitchconfig# access-list 4 deny any Snmp-server engineID local Configuring Snmp Groups and UsersV1 is the least secure of the possible security models Integers twice the normal widthSnmp-server user username End Example Configuring Snmp NotificationsNotification Type Keyword Description Rtr Snmp-server enable traps port-securitySnmp-server enable traps port-security trap-rate rate Port-securitySnmp-server user username group-nameremote V2c access access-list v3 encrypted accessRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Limiting Tftp Servers Used Through Snmp Snmp-server contact text Sets the system contact stringSnmp-server location text Sets the system location string Snmp-server tftp-server-list Monitoring Snmp StatusSnmp Examples Switchconfig# snmp-server enable traps entity Prerequisites for Span and Rspan Configuring Span and RspanRspan Restrictions for Span and RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Information About Span and Rspan Span and RspanLocal Span Remote Span Example of Local Span Configuration on a Single DeviceSpan and Rspan Concepts and Terminology Example of Rspan ConfigurationSpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Span and Rspan and Device Stacks Flow-Based SpanDefault Span and Rspan Configuration Configuration GuidelinesSpan Configuration Guidelines Creating a Local Span Session How to Configure Span and RspanRspan Configuration Guidelines Fspan and Frspan Configuration GuidelinesBoth rx tx Monitor session sessionnumber sourceEnd Local remote No monitor session sessionnumber allSpecifying VLANs to Filter Command or Action PurposeMonitor session sessionnumber filter vlan Configuring a Vlan as an Rspan VlanRemote-span Remote-span EndCreating an Rspan Source Session Destination remote vlan vlan-id Monitor session sessionnumberSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configure terminal Enters global configuration mode Configuring an Fspan SessionMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Or Frspan configuration Monitoring Span and Rspan OperationsShow monitor Example Configuring Local Span Span and Rspan Configuration ExamplesExamples Creating an Rspan Vlan Feature History and Information for Span and RspanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.