I didn't tested it so far but i think you can install a service on a pc which is capturing a spanned port. With another Wireshark installed pc you can download the capture files or maybe even live data.
I'm looking for a different solution though, something that will not require installing something on a pc, but a config on the Switches (with the Voice Vlan), and the destination will be the VM server with the application that will analyze the traffic.
you can use vlan based L2TPv3 point to point L2 transport overe the two C3845 to carry the RSPAN vlan with the performance limitations of the software based routers and with the speed limitation of the WAN link.
the new vlan has to be enabled on links between the C3845 and the LAN switches and you would need to use 802.1Q L2 trunk on switch side and SVI for the vlan(s) where L3 communication with WAN router hat to take place.
If you are using routed ports you can use additional ports to be configured as 802.1Q trunks to carry only the new RSPAN vlan and you will need additional ports also on the C3845 routers (unless you want to migrate to 802.1Q L2 trunks the current links)
from the point of view of the two LAN switches an end-to-end L2 path for RSPAN is setup and you should be able to move captured traffic to the other site over the L3 WAN link if the WAN link speed is greater then the mirrored traffic volume.
the C3845 will need an IOS image of appropriate feature set to support L2TPv3, you can check this using feature navigator at
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...