![Cisco Catalyst Blade 3032 Software Configuration Manual Download Page 712](http://html.mh-extra.com/html/cisco/catalyst-blade-3032/catalyst-blade-3032_software-configuration-manual_67665712.webp)
30-24
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-06
Chapter 30 Configuring SPAN and RSPAN
Configuring FSPAN and FRSPAN
To delete an RSPAN session, use the
no
monitor session
session_number
global configuration
command. To remove a destination port from the RSPAN session, use the
no monitor session
session_number
destination interface
interface-id
global configuration command. The ingress options
are ignored with the
no
form of the command.
This example shows how to configure VLAN 901 as the source remote VLAN in RSPAN session 2, to
configure Gigabit Ethernet source port 2 as the destination interface, and to enable forwarding of
incoming traffic on the interface with VLAN 6 as the default receiving VLAN.
Switch(config)#
monitor session 2 source remote vlan 901
Switch(config)#
monitor session 2 destination interface gigabitethernet1/0/2 ingress
vlan 6
Switch(config)#
end
Configuring FSPAN and FRSPAN
These sections contain this configuration information:
•
Configuration Guidelines, page 30-24
•
Configuring an FSPAN Session, page 30-25
•
Configuring an FRSPAN Session, page 30-27
Configuration Guidelines
Follow these guidelines when configuring FSPAN or FRSPAN:
•
You can attach ACLs to only one SPAN or RSPAN session at a time.
•
When no FSPAN ACLs are attached, FSPAN is disabled, and all traffic is copied to the SPAN
destination ports.
•
When at least one FSPAN ACL is attached, FSPAN is enabled.
–
When you attach an empty FSPAN ACL to a SPAN session, it does not filter packets, and all
traffic is monitored.
–
When you attach at least one FSPAN ACL that is not empty to a SPAN session, and you have
not attached one or more of the other FSPAN ACLs (for instance, you have attached an IPv4
ACL that is not empty, and have not attached IPv6 and MAC ACLs), FSPAN blocks the traffic
that would have been filtered by the unattached ACLs. Therefore, this traffic is not monitored.
•
Port-based FSPAN sessions can be configured on a stack that includes Catalyst 3750 switches as
long as the session only includes Catalyst 3750-E ports as source ports. If the session has any
Catalyst 3750 ports as source ports, the FSPAN ACL command is rejected. If the session has FSPAN
ACL configured, any commands including Catalyst 3750 ports as source ports are rejected. The
Catalyst 3750 ports can be added as destination ports in an FSPAN session.
Step 5
end
Return to privileged
EXEC mode.
Step 6
show monitor
[
session
session_number
]
show running-config
Verify the configuration.
Step 7
copy running-config startup-config
(Optional) Save the configuration in the configuration file.
Command
Purpose