
SecureStack C3 Configuration Guide
28-1
28
sFlow Configuration
This
chapter
provides
information
about
the
commands
used
to
configure
and
monitor
the
sFlow
system.
Overview
sFlow
is
a
method
for
monitoring
high
‐
speed
switched
and
routed
networks.
sFlow
technology
is
built
into
network
equipment
and
gives
visibility
into
network
activity,
enabling
effective
management
and
control
of
network
resources.
An
sFlow
solution
consists
of
an
sFlow
Agent,
embedded
in
the
network
device
such
as
a
switch
or
router,
and
an
sFlow
Collector.
The
sFlow
Agent
uses
sampling
technology
to
capture
traffic
statistics
from
the
device
it
is
monitoring
and
immediately
forwards
the
sampled
traffic
statistics
to
an
sFlow
Collector
for
analysis
in
sFlow
datagrams.
The
sFlow
Agent
uses
two
forms
of
sampling—
statistical
packet
‐
based
sampling
of
switched
or
routed
Packet
Flows,
and
time
‐
based
sampling
of
counters.
Version
5
of
sFlow
is
described
in
detail
in
the
document
entitled
“sFlow
Version
5”
available
from
sFlow.org
(http://www.sflow.org).
Using sFlow in Your Network
The
advantages
of
using
sFlow
include:
•
sFlow
makes
it
possible
to
monitor
ports
of
a
switch,
with
no
impact
on
the
distributed
switching
performance.
(See
“
Usage
Notes
”
on
page 28
‐
3
for
more
information.)
•
sFlow
requires
very
little
memory
or
CPU
usage.
Samples
are
not
aggregated
into
a
flow
‐
table
on
the
switch
—
they
are
forwarded
immediately
over
the
network
to
the
sFlow
Collector.
•
The
system
is
tolerant
to
packet
loss
in
the
network.
(The
statistical
model
means
loss
is
equivalent
to
a
slight
change
in
the
sampling
rate.)
•
The
sFlow
Collector
can
receive
data
from
multiple
switches,
providing
a
real
‐
time
synchronized
view
of
the
whole
network.
•
The
sFlow
Collector
can
analyze
traffic
patterns
for
whatever
protocols
are
found
in
the
packet
headers
(for
example,
TCP/IP,
IPX,
Ethernet,
AppleTalk).
There
is
no
need
for
the
layer
2
switch
to
decode
and
understand
all
protocols.
For information about...
Refer to page...
Overview
28-1
Commands
28-4
Summary of Contents for SECURESTACK C3
Page 2: ......
Page 34: ...xxxii...
Page 40: ...Getting Help xxxviii About This Guide...
Page 126: ...clear license 4 6 Activating Licensed Features...
Page 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Page 228: ...clear port protected name 7 60 Port Configuration...
Page 270: ...clear snmp interface 8 42 SNMP Configuration...
Page 396: ...clear port txq 12 10 Port Priority Configuration...
Page 414: ...ip igmp robustness 13 18 IGMP Configuration...
Page 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Page 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Page 640: ...traceroute ipv6 21 10 IPv6 Management...
Page 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Page 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Page 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Page 848: ...TACACS Configuration clear tacacs interface 27 14...
Page 866: ...sFlow Configuration show sflow agent 28 18...
Page 872: ...Index 4...