Solved

Setup SPAN to monitor DMZ traffic

Posted on 2016-09-08
2
57 Views
Last Modified: 2016-10-12
Our security recently setup a palo alto and it also was configured as DMZ connecting to a Catalyst 2960S. I was asked to configure SPAN on a port to monitor a port channel.
!
interface port-channel 10
!
interface g0/23
switchport mode trunk
channel-group 10
!
interface g0/24
switchport mode trunk
channel-group 10

Could someone please comment on my command to configure SPAN below? Did I miss anything?
source port: port-channel 10
destination port: G0/4

Switch(config-if)#interface g0/4
Switch(config-if)#port monitor port-channel 10

Thanks!
0
Comment
Question by:techy98
2 Comments
 
LVL 14

Accepted Solution

by:
SIM50 earned 500 total points
ID: 41790146
monitor session 1 source interface po10
monitor session 1 destination interface gig0/4 encap dot1q

to clear:
no monitor session 1
0
 

Author Comment

by:techy98
ID: 41840169
SIM50, I have one more question...would be appreciated if you could help.
What if I want to monitor a port-channel which is currently an uplink to core switch (Catalyst6509), could I do this? would it be any impact to Spanning Tree?
Also, before configuring the destination port, the port was configured as below? Do I need to configure port "no switchport mode access" first?
interface gig0/4
switchport mode access
spanning-tree portfast
spanning-tree guard root
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Infrastructure for Branch Office 16 98
Layer 2 versus layer 3 10 116
Managed vs unmanaged switches 8 63
Review of a VPN cert policy 4 43
There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question