I saw similar posts but I am still lost and my configuration is a bit different. I have configured a SPAN port on my Cisco 4510 switch, however I am not seeing the desired traffic in my Websense server. I am verifying using Wireshark as suggested by Websense support, but I am seeing no results.
Here is the show monitor for the session I created:
Type : Local Session
Source VLANs :
Both : 1-252
Destination Ports : Fa7/2
Encapsulation : Native
Ingress : Enabled, default VLAN = 1
Learning : Disabled
Filter Pkt Type :
RX Only : Good
We have a lot of VLANs and I am trying to monitor almost all of them to see what type of bandwidth is being used.
Suggestion from Websense support:
You can run Wireshark against the NIC you're port spanning to and use the filter:
http contains purple.com
Each time you feel you may have configured your port span correctly, go to purple.com from a workstation that should be passing through the configured port span. You should see a GET request packet appear in WIreshark if your port span is correctly configured.
In this case, I see that you are sending traffic from vlans 1-252 to a fast ethernet port. Do you see any drops on that interface? It just because I would say that the amount of traffic is too much for a Fastethernet port which may cause congestion and output drops. Therefore you might not see all traffic as desire.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...