Solved

cisco 3560G Span port

Posted on 2013-05-21
4
546 Views
Last Modified: 2013-11-29
Hello,

We are inserting a IDS appliance into our system and need to setup a span port for it to use.  I am not really clear on how to do this.  The Cisco 3560 switch connects to our asa firewall which is in routed mode via a trunk port on port 12 of the switch.  I assume this is the best port to monitor?  I have an open port 15 that I was going to connect to the IDS system.  Would the correct command be
monitor session 1 source interface fastethernet 0/12  
&
monitor session 1 destination interface fastethernet 0/15

I have never done this before and am looking for any help or advice to make sure this looks ok and will not cause any issues on the switch/network doing it like this.  Any help is appreciated.

Thank you
0
Comment
Question by:Tim Lewis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 25

Accepted Solution

by:
Cyclops3590 earned 500 total points
ID: 39185766
close

monitor session 1 source interface fastethernet 0/12
monitor session 1 destination interface fastethernet 0/15 encapsulation dot1q

need that at the end so it doesn't strip the vlan tagging info.
0
 

Author Comment

by:Tim Lewis
ID: 39185811
Thank you. Does doing this affect the monitored port in anyway?
0
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 39185852
not that i've ever seen.  there's clearly going to be resources used by the switch to do the operation but none that should affect the actual data traffic.
0
 

Author Comment

by:Tim Lewis
ID: 39188117
I found that the command to monitor should be monitor session 1 destination interface fastethernet 0/15 encapsulation replicate.    otherwise good to go.  Thanks for the help
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question