Cisco Systems WSC2960X24PSL, WSC2960X24TDL No monitor session sessionnumber all, Local remote

Page 93

Configuring SPAN and RSPAN

Creating a Local SPAN Session and Configuring Incoming Traffic

 

Command or Action

Purpose

Step 2

no monitor session {session_number all

Removes any existing SPAN configuration for the session.

 

local remote}

For session_number, the range is 1 to 66.

 

 

 

Example:

allRemoves all SPAN sessions.

 

Switch(config)# no monitor session all

localRemoves all local sessions.

remoteRemoves all remote SPAN sessions.

Step 3

monitor session session_number source

Specifies the SPAN session and the source port (monitored port).

 

{interface interface-id vlan vlan-id} [, -]

 

 

[both rx tx]

 

Example:

Switch(config)# monitor session 2 source gigabitethernet1/0/1 rx

Step 4 monitor session session_number destination {interface interface-id[, -] [encapsulation replicate] [ingress {dot1q vlan vlan-id isl untagged vlan vlan-id vlan vlan-id}]}

Example:

Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation replicate ingress dot1q vlan 6

Specifies the SPAN session, the destination port, the packet encapsulation, and the ingress VLAN and encapsulation.

For session_number, specify the session number entered in Step 3.

For interface-id, specify the destination port. The destination interface must be a physical port; it cannot be an EtherChannel, and it cannot be a VLAN.

(Optional) [, -] Specify a series or range of interfaces. Enter a space before and after the comma or hyphen.

(Optional) encapsulation replicate specifies that the destination interface replicates the source interface encapsulation method. If not selected, the default is to send packets in native form (untagged).

ingress enables forwarding of incoming traffic on the destination port and to specify the encapsulation type:

dot1q vlan vlan-idAccepts incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN.

islForwards ingress packets with ISL encapsulation.

untagged vlan vlan-idor vlan vlan-idAccepts incoming packets with untagged encapsulation type with the specified VLAN as the default VLAN.

dot1q vlan vlan-idAccept incoming packets with IEEE 802.1Q encapsulation with the specified VLAN as the default VLAN.

islForward ingress packets with ISL encapsulation.

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

OL-29044-01

81

Image 93
Contents First Published July 10 Americas HeadquartersPage N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Document Conventions Convention DescriptionBold font Reader Alert Conventions Related Documentation Obtaining Documentation and Submitting a Service RequestXii Command Modes Information About Using the Command-Line InterfaceConfigure Mode Access Method Prompt Exit Method About This ModeQuit Ctrl-ZCommand or Action Purpose Step Using the Help SystemMode HelpUnderstanding Abbreviated Commands No and default Forms of CommandsCLI Error Messages Configuration Logging How to Use the CLI to Configure FeaturesConfiguring the Command History Error Message MeaningChanging the Command History Buffer Size Recalling CommandsCommand or Action Disabling the Command History Feature Enabling and Disabling Editing FeaturesPrivileged Exec mode Terminal no historyEditing Commands through Keystrokes Editing Command Lines That Wrap Access-list Searching and Filtering Output of show and more CommandsShow more command begin include exclude regular-expression Show more command begin include excludeCommand or Action Example OL-29044-01 Prerequisites for Configuring the Configuration Engine Finding Feature InformationInformation About Configuring the Configuration Engine Restrictions for Configuring the Configuration EngineCisco Configuration Engine Software Related TopicsCisco Configuration Engine Architectural Overview Configuration ServiceCisco Networking Services IDs and Device Hostnames Event ServiceConfigID NameSpace MapperHostname, DeviceID, and ConfigID DeviceIDHostname and DeviceID Cisco IOS CNS Agents Initial ConfigurationIncremental Partial Configuration Automated CNS ConfigurationSynchronized Configuration Device Required ConfigurationConfigure terminal How to Configure the Configuration EngineEnabling the CNS Event Agent EndReconnect-time time backup Configure terminal Enters the global configuration modeCns config initial hostname ip-address Cns config partial hostname ip-addressEnabling the Cisco IOS CNS Agent Command or Action Purpose Enabling an Initial Configuration for Cisco IOS CNS AgentOn the switch End Returns to privileged Exec modeExit Hostname name Configure terminal Cns template connect nameDiscover controller controller-typedlci Exit Returns to global configuration modeExit Hostname string string udi event image commandSource ip-address syntax-check Port-number event no-persistShow cns config connections Refreshing DeviceIDsShow cns event connections No cns event ip-address port-number Cns config partial ip-addresshostname Enabling a Partial Configuration for Cisco IOS CNS AgentCommand Purpose Monitoring CNS ConfigurationsTechnical Assistance Description Link Additional ReferencesRelease Modification Cisco IOS 15.02EXCDP Overview Information About CDPDefault CDP Configuration How to Configure CDPConfiguring CDP Characteristics FeatureOptional Configures CDP to send Version-2 advertisements Configure terminal No cdp run End No cdp run Disables CDPDisabling CDP Configure terminal Cdp run End Cdp run Enables CDP if it has been disabledEnabling CDP Enters interface configuration mode No cdp enable EndDisabling CDP on an Interface Specifies the interface on which you are disabling CDPEnabling CDP on an Interface Cdp enable EndCommand Description Cdp enable Enables CDP on a disabled interfaceMonitoring and Maintaining CDP Specifies the interface on which you are enabling CDPShow cdp neighbors interface-id CommandShow cdp traffic Related Documents Related Topic Document TitleFeature History and Information for Cisco Discovery Protocol Supported Snmp Versions Prerequisites for SnmpModel Level Authentication Encryption Result SHA Information About Snmp Restrictions for SnmpSnmp Overview Snmp Manager FunctionsSnmp MIB Variables Access Snmp Agent FunctionsSnmp Community Strings Snmp ifIndex MIB Object Values Snmp NotificationsSnmp Configuration Guidelines Default Snmp ConfigurationFeature Default Setting Interface TypeHow to Configure Snmp Configure terminal No snmp-server EndDisabling the Snmp Agent No snmp-server Disables the Snmp agent operation Configuring Community StringsSwitchconfig# access-list 4 deny any Snmp-server engineID local Configuring Snmp Groups and UsersV1 is the least secure of the possible security models Integers twice the normal widthSnmp-server user username End Example Configuring Snmp NotificationsNotification Type Keyword Description Snmp-server enable traps port-security trap-rate rate Snmp-server enable traps port-securityPort-security RtrSnmp-server user username group-nameremote V2c access access-list v3 encrypted accessRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Limiting Tftp Servers Used Through Snmp Snmp-server contact text Sets the system contact stringSnmp-server location text Sets the system location string Snmp-server tftp-server-list Monitoring Snmp StatusSnmp Examples Switchconfig# snmp-server enable traps entity Prerequisites for Span and Rspan Configuring Span and RspanRspan Restrictions for Span and RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Information About Span and Rspan Span and RspanLocal Span Remote Span Example of Local Span Configuration on a Single DeviceSpan and Rspan Concepts and Terminology Example of Rspan ConfigurationSpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Span and Rspan and Device Stacks Flow-Based SpanDefault Span and Rspan Configuration Configuration GuidelinesSpan Configuration Guidelines Rspan Configuration Guidelines How to Configure Span and RspanFspan and Frspan Configuration Guidelines Creating a Local Span SessionBoth rx tx Monitor session sessionnumber sourceEnd Local remote No monitor session sessionnumber allSpecifying VLANs to Filter Command or Action PurposeMonitor session sessionnumber filter vlan Configuring a Vlan as an Rspan VlanRemote-span Remote-span EndCreating an Rspan Source Session Destination remote vlan vlan-id Monitor session sessionnumberSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configure terminal Enters global configuration mode Configuring an Fspan SessionMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Or Frspan configuration Monitoring Span and Rspan OperationsShow monitor Example Configuring Local Span Span and Rspan Configuration ExamplesExamples Creating an Rspan Vlan Feature History and Information for Span and RspanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.