18-2
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBMBladeCenter, Software Configuration Guide
24R9746
Chapter18 Configuring SPAN and RSPAN
Understanding SPAN and RSPAN
Figure18-1 Example SPAN Configuration
Only traffic that enters or leaves source ports can be monitored by using SPAN.
RSPAN extends SPAN by enabling remote monitoring of multiple switches across your network. The
traffic for each RSPAN session is carried over a user-specified RSPAN VLAN that is dedicated for that
RSPAN session in all participating switches. The SPAN traffic from the sources is copied onto the
RSPAN VLAN through a reflector port and then forwarded over trunk ports that are carrying the RSPAN
VLAN to any RSPAN destination sessions monitoring the RSPAN VLAN, as shown in Figure18-2.
Figure18-2 Example of RSPAN Configuration
SPAN and RSPAN do not affect the switching of network traffic on source ports; a copy of the packets
received or sent by the source interfaces are sent to the destination interface. Except for traffic that is
required for the SPAN or RSPAN session, reflector ports and destination ports do not receive or forward
traffic.
You can use the SPAN destination port to inject traffic from a network security device. For example, if
you connect a Cisco Intrusion Detection System (IDS) Sensor App liance to a destination port, the IDS
device can send TCP Reset packets to close down the TCP session of a suspected attacker.
Note You cannot use the RSPAN destination port to inject traffic from a network security device. The switch
does not support ingress forwarding on an RSPAN destination port.
Port 5 traffic mirrored
on Port 17
Network analyzer
1
1
2
2
3
3
4
4
5
5
6
6
7
7
8
8
9
9
10
10
11
11
12
12
13
13
14
14
17
17
18
18
19
19
20
20
92588
Source switch Intermediate switch Destination switch
74727
RSPAN
source port
RSPAN
destination port
Reflector
port
RSPAN
VLAN
RSPAN
VLAN