CISCO Sniffing for dropped packets?

We are having an issue with beieving that UDP packets are being dropped through our VPN despite articles from this link.

I personally don't think this is an issue with UDP packets through all VPN's so making the switch without current issues or justification is a stupid waste of time in my oppinion.

I need to convince a network admin to somehow analyze traffic through the VPN for dropped UDP packets in order to justify this.

Can someone give describe in their own words or provide a link that describes how to do this?

That would be very helpfull. Thanks a bunch.

Who is Participating?
jjmartineziiiConnect With a Mentor Commented:
You can SPAN a port, range of ports, or VLAN's on Cisco switches. On the destination port, you should run a packet sniffing software like Wireshark.

A simple configuration would be:
Switch(config)# monitor session 1 source interface fastEthernet0/1
Switch(config)# monitor session 1 destination interface fastEthernet0/10

assuming the traffic you want to sniff is on fa0/1 and the wiresnifer is on fa 0/10.
snyderkvAuthor Commented:

I don't know this tool but would I be correct to say the next step would be to filter for dropped UDP packets or do you know a better way to put this considering the tools options? As you figured out I won't be doing it myself. I just need the buz words.
Now that I think about it, I don't know how you would see dropped packets if they are dropped...I'm not sure what you are trying to do is possible.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.