1-22
Software Configuration Guide—Release 15.0(2)SG
OL-23818-01
Chapter 1 Product Overview
Management Features
NetFlow-lite
Note NetFlow-lite is only supported on Catalyst 4948E Ethernet Switch.
The Netflow-lite feature is based on ingress packet sampling at a monitoring point that can be an
interface on the switch. By exporting NetFlow sampled packets, it provides visibility into traffic that is
switched through the device. The rate at which input packets are sampled is configurable and a wide
range of sampling rates are supported. Each sampled packet is exported as a separate NetFlow data
record in the data path. Netflow V9 and V10(IPFIX) export formats are supported.
For more information on NetFlow statistics, see Chapter 55, “Configuring NetFlow-lite.”
Secure Shell
Secure Shell (SSH) is a program that enables you to log into another computer over a network, to execute
commands remotely, and to move files from one machine to another. The switch may not initiate SSH
connections: SSH will be limited to providing a remote login session to the switch and will only function
as a server.
Simple Network Management Protocol
Simple Network Management Protocol (SNMP) facilitates the exchange of management information
between network devices. The Catalyst 4500 series switch supports these SNMP types and
enhancements:
SNMP—A full Internet standard
SNMP v2—Community-based administrative framework for version 2 of SNMP
SNMP v3—Security framework with three levels: noAuthNoPriv, authNoPriv, and authPriv
(available only on a crypto image, such as cat4000-i5k91s-mz)
SNMP trap message enhancements—Additional information with certain SNMP trap messages,
including spanning-tree topology change notifications and configuration change notifications
For more information on SNMP, see Chapter 54, “Configuring SNMP.”
SPAN and RSPAN
Switched Port Analyzer (SPAN) allows you to monitor traffic on any port for analysis by a network
analyzer or Remote Monitoring (RMON) probe. You also can do the following:
Configure ACLs on SPAN sessions.
Allow incoming traffic on SPAN destination ports to be switched normally.
Explicitly configure the encapsulation type of packets that are spanned out of a destination port.
Restrict ingress sniffing depending on whether the packet is unicast, multicast, or broadcast, and
depending on whether the packet is valid.
Mirror packets sent to or from the CPU out of a SPAN destination port for troubleshooting purposes.
For information on SPAN, see Chapter 51, “Configuring SPAN and RSPAN.”