S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
52-28
Cisco MDS 9000 Family CLI Configuration Guide
OL-16184-01, Cisco MDS SAN-OS Release 3.x
Chapter 52 Monitoring Network Traffic Using SPAN
Remote SPAN
To reference the explicit path, follow these steps:
This configuration explicitly specifies Path 1 to be used for the RSPAN traffic. Refer to RFC 3209 for
further details on explicit paths and source based routing.
Monitoring RSPAN Traffic
Once the session is configured, other SPAN sources for this session can also be configured as required.
Figure 52-15
shows an RSPAN setup where one session with destination port fc2/1 and source interface
fc1/1 is used to capture traffic in both ingress and egress directions.
Figure 52-15
Fibre Channel Analyzer Using a Single SD Port to Monitor RSPAN Traffic
To use this setup, the analyzer should have the capability of distinguishing ingress and egress traffic for
all captured frames.
Sample Scenarios
Note
RSPAN can be combined with the local SPAN feature so SD ports forward local SPAN traffic along with
remote SPAN traffic. Various SPAN source and tunnel scenarios are described in this section.
Single Source with One RSPAN Tunnel
The source Switch S and the destination Switch D are interconnected through a Fibre Channel fabric.
An RSPAN tunnel is configured as a destination interface for the SPAN session and the ST port forwards
SPAN traffic through the RSPAN tunnel (see
Figure 52-16
).
Command
Purpose
Step 1
switchS#
config t
Enters configuration mode.
Step 2
switchS(config)#
interface
fc-tunnel 100
References the tunnel ID for Path1.
Step 3
switchS(config)#
explicit-path Path1
Links Path1 to the tunnel ID.
Cisco MDS
9000 switch
Cisco MDS
9000 switch
ST port
SD port
fc2/1
FC analyzer
Fibre Channel
fabric
99009
TE port
fc1/1
Source switch
destination switch
TX
RX
Содержание 9124 - Cisco MDS Fabric Switch
Страница 76: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 122: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 328: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 482: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 733: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m P A R T 5 Security ...
Страница 734: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 957: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m P A R T 6 IP Services ...
Страница 958: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 1182: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 1214: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 1307: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m P A R T 9 Traffic Management ...
Страница 1308: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...
Страница 1331: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m P A R T 1 0 Troubleshooting ...
Страница 1332: ...Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck d o c c i s c o c o m ...