(Optional) Accepts incoming packets with IEEE 802.1Q
encapsulation with the specified VLAN as the default VLAN.
dot1q
(Optional) Accepts incoming packets with untagged
encapsulation with the specified VLAN as the default VLAN.
untagged
Specifies ingress forwarding using ISL encapsulation.
isl
Specifies the remote VLAN for an RSPAN source or
destination session. The range is 2 to 1001 and 1006 to 4094.
The RSPAN VLAN cannot be VLAN 1 (the default VLAN)
or VLAN IDs 1002 to 1005 (reserved for Token Ring and
FDDI VLANs).
remote
Sets the default VLAN for ingress traffic when used with only
the
ingress
keyword.
vlan vlan-id
Command Default
No monitor sessions are configured.
If
encapsulation replicate
is not specified on a local SPAN destination port, packets are sent in native form
with no encapsulation tag.
Ingress forwarding is disabled on destination ports.
You can specify
all
,
local
,
range session-range
, or
remote
with the
no monitor session
command to clear
all SPAN and RSPAN, all local SPAN, a range, or all RSPAN sessions.
Command Modes
Global configuration
Command History
Modification
Release
This command was introduced.
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
Usage Guidelines
You can set a combined maximum of 8 local SPAN sessions and RSPAN source sessions. You can have a
total of 66 SPAN and RSPAN sessions on a switch or switch stack.
A SPAN or RSPAN destination must be a physical port.
You can have a maximum of 64 destination ports on a switch or a switch stack.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source
ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all
active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are
included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination
port.
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
506
monitor session destination
Summary of Contents for Catalyst 3650 Series
Page 2: ... 2017 Cisco Systems Inc All rights reserved ...
Page 37: ...P A R T I Campus Fabric Campus Fabric page 13 ...
Page 38: ......
Page 51: ...P A R T II Interface and Hardware Components Interface and Hardware Commands page 27 ...
Page 52: ......
Page 165: ...P A R T III IP IP page 141 ...
Page 166: ......
Page 235: ...P A R T IV IP Multicast Routing IP Multicast Routing page 211 ...
Page 236: ......
Page 303: ...P A R T V IPv6 IPv6 page 279 ...
Page 304: ......
Page 307: ...P A R T VI Layer 2 3 Layer 2 3 page 283 ...
Page 308: ......
Page 399: ...P A R T VII Multiprotocol Label Switching MPLS MPLS page 375 Multicast VPN page 385 ...
Page 400: ......
Page 429: ...P A R T VIII Network Management Flexible NetFlow page 405 Network Management page 479 ...
Page 430: ......
Page 595: ...P A R T IX Programmability Programmability page 571 ...
Page 596: ......
Page 624: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 598 ping6 ...
Page 625: ...P A R T X QoS Auto QoS page 601 QoS page 641 ...
Page 626: ......
Page 666: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 640 show auto qos ...
Page 706: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 680 trust device ...
Page 707: ...P A R T XI Routing Bidirectional Forwarding Detection page 683 ...
Page 708: ......
Page 725: ...P A R T XII Security Security page 701 ...
Page 726: ......
Page 875: ...P A R T XIII Stack Manager and High Availability Stack Manager and High Availability page 851 ...
Page 876: ......
Page 912: ......
Page 1027: ...P A R T XV VLAN VLAN page 1003 ...
Page 1028: ......
Page 1100: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1074 vtp primary ...
Page 1102: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1076 Notices ...
Page 1108: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches IN 6 Index ...