Datagrams Sent 221
Destination Address 10.0.10.41
Receiver Port 6343
Owner Administrator, CLI-owned, Instance 2
Timeout (seconds) 99995530
Max Datagram Size 1400
Datagram Version Support 5
Note the following details:
•
Destination Address
remains blank unless it has been configured.
•
Datagrams Sent
shows the number of datagrams sent by the switch agent to the management station since
the switch agent was last enabled.
•
Timeout
displays the number of seconds remaining before the switch agent will automatically disable sFlow
(this is set by the management station and decrements with time).
•
Max Datagram Size
shows the currently set value (typically a default value, but this can also be set by the
management station).
Syntax:
show sflow <
receiver instance
> sampling-polling <
port-list/range
>
Displays status information about sFlow sampling and polling.
The
show sflow
instance
sampling-polling [
port-list
]
command displays information about
sFlow sampling and polling on the switch, as shown in the following example. You can specify a list or range of
ports for which to view sampling information.
Figure 29: Example: Viewing sFlow sampling and polling information
NOTE:
The sampling and polling instances (noted in parentheses) coupled to a specific receiver
instance are assigned dynamically, and so the instance numbers may not always match. The key
thing to note is whether sampling or polling is enabled on a port, and the sampling rates or polling
intervals for the receiver instance configured on each port.
Configuring UDLD Verify before forwarding
When an UDLD enabled port transitions to link-up, the port will begin with a UDLD blocking state. UDLD will
probe via protocol packet exchange to determine the bidirectional state of the link. Until UDLD has completed the
probe, all data traffic will be blocked. If the link is found to be bidirectional, UDLD will unblock the port for data
traffic to pass. Once UDLD unblocks the port, other protocols will see the port as up and data traffic can be safely
forwarded.
Chapter 7 Configuring for Network Management Applications
215