Solved

Create span port on Cisco Catalyst 3500

Posted on 2006-06-16
9
643 Views
Last Modified: 2008-02-26
Greetings,

Can someone assist me with creating a span port on a Cisco Catalyst 3500?

Thanks in advance for your help.

0
Comment
Question by:g000se
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 10

Assisted Solution

by:naveedb
naveedb earned 220 total points
ID: 16924076
Telnet to the switch

You will need the port you want to enable span on. Do show interface to find the port number if you don't know. In following example we are assuming it is port fa 0/2 which will be monitoring port fa 0/5


enable
config term
interface fa 0/2
port monitor fa 0/5
end

0
 
LVL 15

Accepted Solution

by:
Naser Gabaj earned 220 total points
ID: 16924154
0
 
LVL 15

Expert Comment

by:Naser Gabaj
ID: 16924172
g000se

lol:) Sorry It was mistyping, I mean you when i post my answer.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 11

Author Comment

by:g000se
ID: 16924443
thanks for your input
0
 
LVL 11

Author Comment

by:g000se
ID: 16924449
what does spanning mean or do?  For example if I span the port that means I can use it to monitor the other ports?
0
 
LVL 15

Expert Comment

by:Naser Gabaj
ID: 16924630
0
 
LVL 11

Author Comment

by:g000se
ID: 16926940
thanks.  i use some of those too.  I was wondering to get more of a deeper understanding.  thanks.
0
 
LVL 11

Assisted Solution

by:rvthost
rvthost earned 60 total points
ID: 16926959
Hi g000se, looking for a deep understanding or a simple breakdown?  Basically, by spanning a port, it allows you to plug in a packet analyzer into one port for example, and see all the traffic to/from the other port that you are specifically monitoring.
0
 
LVL 11

Author Comment

by:g000se
ID: 16970689
Thanks. rythost for the information.

Thank you all for assisting me with the question posted.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses
Course of the Month7 days, 21 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question