22
Catalyst6000 Family Network Analysis Module Installation and Configuration Note
78-10406-05
Configuring the NAM
Using SPAN as a Traffic SourceNote You can configure SPAN as a traffic source using both the CLI and the NAM Traffic Analyzer
application.
To direct SPAN traffic to the NAM for monitoring, configure port 1 on the NAM as the SPAN destination
port. You cannot use ports on the NAM module as SPAN source ports.
The NAM can analyze Ethernet VLAN traffic from Ethernet or Fast Ethernet SPAN source ports. You
can also specify an Ethernet VLAN as the SPAN source.
The NAM can analyze Ethernet traffic from Ethernet, Fast Ethernet, Gigabit Ethernet, trunk port, or Fast
EtherChannel SPAN source ports. You can also specify an Ethernet VLAN as the SPAN source.
To use the SPAN source port as a traffic source for the NAM, set port 1 on the NAM as the SPAN
destination port. You cannot set port 2 on the NAM as a SPAN source port.
Refer to the Catalyst 6000 Family IOS Software Configuration Guide at the following website for more
information on SPAN:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/index.htm
For more information on configuring SPAN, refer to the switch software configuration guide.
To enable SPAN on the NAM, perform one of these tasks:
This example shows how to enable SPAN on the NAM:
Router#show monitor
Session 1
---------
Source Ports:
RX Only: None
TX Only: None
Both: None
Task Command
Set the source interfaces and
VLANs for the monitor session.
Router (config)# monitor session {session_number} {source
{interface type slot/port} | {vlan vlan_ID}} [, | - | rx | tx | both]
Enable port 1 of the NAM as a
SPAN destination.
Router (config)# monitor session {session_number} {destination
{interface type slot/port} [, | - ] | {vlan vlan_ID}}
Disable the monitor session. Router (config)# no monitor session session_number
Filter the SPAN session so that
only certain VLANs are seen from
switch port trunks.
Router (config)# monitor session {session_number} {filter
{vlan_ID} [, | - ]}
Show current monitor sessions. Router # show monitor session {session_number}