Solved

Cisco SPAN with mutiple vlan

Posted on 2010-11-10
1
852 Views
Last Modified: 2013-12-09
I am trying to set up a monitor session on a cisco 6500, but have a few questions.

Below is my setup:

sh monitor session 1
Session 1
---------
Type                   : -
Destination Ports      : Gi11/2
Filter VLANs           : 8,10,16,30,128-129,950,952

sjc0swi00#sh run int g11/2
Building configuration...

Current configuration : 145 bytes
!
interface GigabitEthernet11/2
 switchport
 switchport trunk allowed vlan 8,10,16,30,128,129,950,952
 switchport mode trunk
 no ip address
end

Since I am trying to monitor several different vlan does the destination port has to be trunked? If so, how should I configure it?

Thanks
0
Comment
Question by:snwl-itservices
1 Comment
 
LVL 10

Accepted Solution

by:
cstosgale earned 500 total points
ID: 34106708
The config of the destination doesn't matter as it will be ignored. Anything connected to it will not be able to do anything apart from receive packets from the source vlans.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to make my old USB printer wireless? 71 201
What are acceptable WiFi signal strengths 6 71
URL to download Engenius BH-ENS202 firmware update 4 33
PEAP with MSChap-v2 12 48
I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question