Workaround solution for overcomming the limitation of 2 Local SPAN sessions
We are looking for a way to send traffic to a network traffic analysis box connected to our 7600 router port from source port belonging to a VRF. We thought of using the SPAN feature to do the same. But assuming the customer belonging to different VRF may not be guarenteed with their uniqueness of IP addresses between them and at the same time wants the same monitor box to use for all the customers, we fall into a requirement of each customer VRF port to a session and so that the monitoring box has an ability to distinguish the traffic it recived through the SPAN session .In this perspective our 7600 router has limitation on the software to support only 2 local span sessions and which limit us to 2 customer. We were looking for around 8 span sessions ,has the monitoring box has only 8 session capability.
Is there a way to send traffic seperated from each VRf to this network monitoring device connected to a port.
There are several enhancements in Release 12.2(33)SXH to SPAN features to make it easier for network operators to monitor and troubleshoot their network environments.
Increase of Egress SPAN ports. The Catalyst 6500 now can deliver 14 Tx-only SPAN ports plus 2 Tx/Rx/Both ports, for a total of 16 SPAN ports. Customers can now monitor their traffic with TX, looking at traffic leaving the port, or RX, looking at traffic entering the port, or both.
You could also use VACL capture if that works out for you
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...