Catalyst Switched Port Analyzer (SPAN RSPAN) Configuration Example
Catalyst Switched Port Analyzer (SPAN RSPAN) Configuration Example
Configuration Example
Document ID: 10570
Contributed by Shashank Singh, Cisco TAC Engineer.
Apr 21, 2014
Contents
Introduction
Prerequisites
Catalyst Switches That Support SPAN, RSPAN, and ERSPAN
Requirements
Components Used
Conventions
Background Information
Brief Description of SPAN
SPAN Terminology
Characteristics of Source Port
Characteristics of Source VLAN
Characteristics of Destination Port
Characteristics of Reflector Port
SPAN on Catalyst Express 500/520
SPAN on the Catalyst 2900XL/3500XL Switches
Features that are Available and Restrictions
Configuration Example
Network Diagram
Sample Configuration on the Catalyst 2900XL/3500XL
Configuration Steps Explanation
SPAN on the Catalyst 2948G−L3 and 4908G−L3
SPAN on the Catalyst 8500
SPAN on the Catalyst 2900, 4500/4000, 5500/5000, and 6500/6000 Series Switches That Run CatOS
Local SPAN
PSPAN, VSPAN: Monitor Some Ports or an Entire VLAN
Monitor a Single Port with SPAN
Monitor Several Ports with SPAN
Monitor VLANs with SPAN
Ingress/Egress SPAN
Implement SPAN on a Trunk
Monitor a Subset of VLANs That Belong to a Trunk
Trunking on the Destination Port
Create Several Simultaneous Sessions
Other SPAN Options
Remote SPAN
RSPAN Overview
RSPAN Configuration Example
Setup of the ISL Trunk Between the Two Switches S1 and S2
Creation of the RSPAN VLAN
Configuration of Port 5/2 of S2 as an RSPAN Destination Port
Configuration of an RSPAN Source Port on S1
Verify the Configuration
Other Configurations That Are Possible with the set rspan Command
Feature Summary and Limitations
SPAN on the Catalyst 2940, 2950, 2955, 2960, 2970, 3550, 3560, 3560−E, 3750 and 3750−E Series
Switches
SPAN on the Catalyst 4500/4000 and Catalyst 6500/6000 Series Switches That Run Cisco IOS System
Software
Configuration Example
Feature Summary and Limitations
Performance Impact of SPAN on the Different Catalyst Platforms
Catalyst 2900XL/3500XL Series
Architecture Overview
Performance Impact
Catalyst 4500/4000 Series
Architecture Overview
Performance Impact
Catalyst 5500/5000 and 6500/6000 Series
Architecture Overview
Performance Impact
Frequently Asked Questions and Common Problems
Connectivity Issues Because of SPAN Misconfiguration
SPAN Destination Port Up/Down
Why Does the SPAN Session Create a Bridging Loop?
Does SPAN Impact Performances?
Can You Configure SPAN on an EtherChannel Port?
Can You Have Several SPAN Sessions Run at the Same Time?
Error "% Local Session Limit Has Been Exceeded"
Cannot Delete a SPAN Session on the VPN Service Module, with the Error "% Session [Session No:]
Used by Service Module"
Why Are You Unable to Capture Corrupted Packets with SPAN?
Error : % Session 2 used by service module
Reflector Port Drops Packets
SPAN Session is Always Used With an FWSM in the Catalyst 6500 Chassis
Can a SPAN and an RSPAN Session Have the Same ID Within the Same Switch?
Can an RSPAN Session Work Across Different VTP Domains?
Can an RSPAN Session Work Across WAN or Different Networks?
Can a RSPAN Source Session and the Destination Session Exist on the Same Catalyst Switch?
Network Analyzer/Security Device Connected to SPAN Destination Port is Not Reachable
Related Information
Introduction
This document describes the recent features of the Switched Port Analyzer (SPAN) that have been
implemented. The SPAN feature, which is sometimes called port mirroring or port monitoring, selects
network traffic for analysis by a network analyzer. The network analyzer can be a Cisco SwitchProbe device
or other Remote Monitoring (RMON) probe. Previously, SPAN was a relatively basic feature on the Cisco
Catalyst Series switches. However, the latest releases of the Catalyst OS (CatOS) introduced great
enhancements and many new possibilities that are now available to the user. This document is not intended to
be an alternate configuration guide for the SPAN feature. This document answers the most common questions
about SPAN, such as:
Prerequisites
Catalyst Switches That Support SPAN, RSPAN, and ERSPAN
Catalyst Switches
SPAN Support RSPAN Support ERSPAN Support
Catalyst Express
500 / 520 Series
Yes No No
Yes Supervisor 2T with
PFC4, Supervisor 720
with PFC3B or
PFC3BXL running
Catalyst 6500/6000 Cisco IOS Software
Series Release 12.2(18)SXE or
Yes Yes
later. Supervisor 720
with PFC3A that has
hardware version 3.2 or
later and running Cisco
IOS Software Release
12.2(18)SXE or later
Catalyst 5500/5000
Series
Yes No No
Catalyst 4900 Series
Yes Yes No
Catalyst 4500/4000
Series (includes
4912G)
Yes Yes No
Catalyst 3750 Metro
Series
Yes Yes No
Catalyst 3750 /
3750E /3750X
Series
Yes Yes No
Catalyst 3560 /
3560E/ 3650X
Series
Yes Yes No
Catalyst 3550 Series
Yes Yes No
Catalyst 3500 XL
Series
Yes No No
Catalyst 2970 Series
Yes Yes No
Catalyst 2960 Series
Yes Yes No
Catalyst 2955 Series
Yes Yes No
Catalyst 2950 Series
Yes Yes No
Catalyst 2940 Series
Yes No No
Catalyst 2948G−L3
No No No
Catalyst 2948G−L2,
2948G−GE−TX,
2980G−A
Yes Yes No
Catalyst 2900XL
Series
Yes No No
Catalyst 1900 Series
Yes No No
Requirements
There are no specific requirements for this document.
Components Used
This information in this document uses CatOS 5.5 as a reference for the Catalyst 4500/4000, 5500/5000, and
6500/6000 Series Switches. On the Catalyst 2900XL/3500XL Series Switches, Cisco IOS® Software Release
12.0(5)XU is used. Although this document is updated to reflect changes to SPAN, refer to your switch
platform documentation release notes for the latest developments on the SPAN feature.
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, make sure
that you understand the potential impact of any command.
Conventions
Refer to Cisco Technical Tips Conventions for more information on document conventions.
Background Information
Brief Description of SPAN
What is SPAN and why is it needed? The SPAN feature was introduced on switches because of a fundamental
difference that switches have with hubs. When a hub receives a packet on one port, the hub sends out a copy
of that packet on all ports except on the one where the hub received the packet. After a switch boots, it starts
to build up a Layer 2 forwarding table on the basis of the source MAC address of the different packets that the
switch receives. After this forwarding table is built, the switch forwards traffic that is destined for a MAC
address directly to the corresponding port.
For example, if you want to capture Ethernet traffic that is sent by host A to host B, and both are connected to
a hub, just attach a sniffer to this hub. All other ports see the traffic between hosts A and B:
On a switch, after the host B MAC address is learned, unicast traffic from A to B is only forwarded to the B
port. Therefore, the sniffer does not see this traffic:
In this configuration, the sniffer only captures traffic that is flooded to all ports, such as:
• Broadcast traffic
• Multicast traffic with CGMP or Internet Group Management Protocol (IGMP) snooping disabled
• Unknown unicast traffic
Unicast flooding occurs when the switch does not have the destination MAC in its content−addressable
memory (CAM) table. The switch does not know where to send the traffic. The switch floods the packets to
all the ports in the destination VLAN.
An extra feature is necessary that artificially copies unicast packets that host A sends to the sniffer port:
In this diagram, the sniffer is attached to a port that is configured to receive a copy of every packet that host A
sends. This port is called a SPAN port. The other sections of this document describe how you can tune this
feature very precisely in order to do more than just monitor a port.
SPAN Terminology
• Ingress traffic−Traffic that enters the switch.
• Egress traffic−Traffic that leaves the switch.
• Source (SPAN) port −A port that is monitored with use of the SPAN feature.
• Source (SPAN) VLAN −A VLAN whose traffic is monitored with use of the SPAN feature.
• Destination (SPAN) port −A port that monitors source ports, usually where a network analyzer is
connected.
• Reflector Port −A port that copies packets onto an RSPAN VLAN.
• Monitor port−A monitor port is also a destination SPAN port in Catalyst 2900XL/3500XL/2950
terminology.
• Local SPAN−The SPAN feature is local when the monitored ports are all located on the same switch
as the destination port. This feature is in contrast to Remote SPAN (RSPAN), which this list also
defines.
• Remote SPAN (RSPAN)−Some source ports are not located on the same switch as the destination
port. RSPAN is an advanced feature that requires a special VLAN to carry the traffic that is monitored
by SPAN between switches. RSPAN is not supported on all switches. Check the respective release
notes or configuration guide to see if you can use RSPAN on the switch that you deploy.
• Port−based SPAN (PSPAN)−The user specifies one or several source ports on the switch and one
destination port.
• VLAN−based SPAN (VSPAN)−On a particular switch, the user can choose to monitor all the ports
that belong to a particular VLAN in a single command.
• ESPAN−This means enhanced SPAN version. This term has been used several times during the
evolution of the SPAN in order to name additional features. Therefore, the term is not very clear. Use
of this term is avoided in this document.
• Administrative source−A list of source ports or VLANs that have been configured to be monitored.
• Operational source−A list of ports that are effectively monitored. This list of ports can be different
from the administrative source. For example, a port that is in shutdown mode can appear in the
administrative source, but is not effectively monitored.
Characteristics of Source Port
A source port, also called a monitored port, is a switched or routed port that you monitor for network traffic
analysis. In a single local SPAN session or RSPAN source session, you can monitor source port traffic, such
as received (Rx), transmitted (Tx), or bidirectional (both). The switch supports any number of source ports (up
to the maximum number of available ports on the switch) and any number of source VLANs.
• It can be any port type, such as EtherChannel, Fast Ethernet, Gigabit Ethernet, and so forth.
• It can be monitored in multiple SPAN sessions.
• It cannot be a destination port.
• Each source port can be configured with a direction (ingress, egress, or both) to monitor. For
EtherChannel sources, the monitored direction applies to all physical ports in the group.
• Source ports can be in the same or different VLANs.
• For VLAN SPAN sources, all active ports in the source VLAN are included as source ports.
VLAN Filtering
When you monitor a trunk port as a source port, all VLANs active on the trunk are monitored by default. You
can use VLAN filtering in order to limit SPAN traffic monitoring on trunk source ports to specific VLANs.
• All active ports in the source VLAN are included as source ports and can be monitored in either or
both directions.
• On a given port, only traffic on the monitored VLAN is sent to the destination port.
• If a destination port belongs to a source VLAN, it is excluded from the source list and is not
monitored.
• If ports are added to or removed from the source VLANs, the traffic on the source VLAN received by
those ports is added to or removed from the sources that are monitored.
• You cannot use filter VLANs in the same session with VLAN sources.
• You can monitor only Ethernet VLANs.
Characteristics of Destination Port
Each local SPAN session or RSPAN destination session must have a destination port (also called a monitoring
port) that receives a copy of traffic from the source ports and VLANs.
• A destination port must reside on the same switch as the source port (for a local SPAN session).
• A destination port can be any Ethernet physical port.
• A destination port can participate in only one SPAN session at a time. A destination port in one SPAN
session cannot be a destination port for a second SPAN session.
• A destination port cannot be a source port.
• A destination port cannot be an EtherChannel group.
Note: From Cisco IOS Software Release 12.2(33)SXH and later, PortChannel interface can be a
destination port. Destination EtherChannels do not support the Port Aggregation Control Protocol
(PAgP) or Link Aggregation Control Protocol (LACP) EtherChannel protocols; only the on mode is
supported, with all EtherChannel protocol support disabled.
Note: Refer to Local SPAN, RSPAN, and ERSPAN Destinations for more information.
• A destination port can be a physical port that is assigned to an EtherChannel group, even if the
EtherChannel group has been specified as a SPAN source. The port is removed from the group while
it is configured as a SPAN destination port.
• The port does not transmit any traffic except that traffic required for the SPAN session unless learning
is enabled. If learning is enabled, the port also transmits traffic directed to hosts that have been
learned on the destination port.
Note: Refer to Local SPAN, RSPAN, and ERSPAN Destinations for more information.
• The state of the destination port is up/down by design. The interface shows the port in this state in
order to make it evident that the port is currently not usable as a production port.
• If ingress traffic forwarding is enabled for a network security device. The destination port forwards
traffic at Layer 2.
• A destination port does not participate in spanning tree while the SPAN session is active.
• When it is a destination port, it does not participate in any of the Layer 2 protocols (STP, VTP, CDP,
DTP, PagP).
• A destination port that belongs to a source VLAN of any SPAN session is excluded from the source
list and is not monitored.
• A destination port receives copies of sent and received traffic for all monitored source ports. If a
destination port is oversubscribed, it can become congested. This congestion can affect traffic
forwarding on one or more of the source ports.
You can download CNA from the Download Software (registered customers only) page.
2. Complete the steps given in Getting Started Guide for the Catalyst Express 500 Switches 12.2(25)FY
in order to customize the switch settings for Catalyst Express 500. Refer to Getting Started Guide for
the Catalyst Express 520 Switches for more information on Catalyst Express 520.
3. Use CNA to log into the switch, and click Smartport.
4. Click any interface where you plan to connect the PC in order to capture the sniffer traces.
5. Click Modify.
If you select none, the port only receives traffic. The Ingress VLAN allows the PC connected to the
Diagnostics port to send packets to the network that uses that VLAN.
8. Click OK in order to close the pop−up box.
9. Click OK and then Apply the settings.
10. You can use any Sniffer software in order to trace the traffic once you set up the diagnostic port.
You can create as many local PSPAN sessions as necessary. For example, you can create PSPAN sessions on
the configuration port that you have chosen to be a destination SPAN port. In this case, issue the port monitor
interface command in order to list the source ports that you want to monitor. A monitor port is a destination
SPAN port in Catalyst 2900XL/3500XL terminology.
• The main restriction is that all the ports that relate to a particular session (whether source or
destination) must belong to the same VLAN.
• If you configure the VLAN interface with an IP address, then the port monitor command monitors
traffic destined to that IP address only. It also monitors the broadcast traffic that is received by the
VLAN interface. However, it does not capture the traffic that flows in the actual VLAN itself. If you
do not specify any interface in the port monitor command, all other ports that belong to the same
VLAN as the interface are monitored.
This list provides some restrictions. Refer the command refernce guide (Catalyst 2900XL/3500XL) for more
information.
Note: ATM ports are the only ports that cannot be monitor ports. However, you can monitor ATM ports. The
restrictions in this list apply for ports that have the port−monitor capability.
Be careful that a port in the monitor state does not run the Spanning Tree Protocol (STP) while the port still
belongs to the VLAN of the ports that it mirrors. The port monitor can be part of a loop if, for instance, you
connect it to a hub or a bridge and loop to another part of the network. In this case, you can end up in a
catastrophic bridging loop condition because STP no longer protects you. See the Why Does the SPAN
Session Create a Bridging Loop? section of this document for an example of how this condition can happen.
Configuration Example
This example creates two concurrent SPAN sessions.
• Port Fast Ethernet 0/1 (Fa0/1) monitors traffic that ports Fa0/2 and Fa0/5 send and receive. Port Fa0/1
also monitors traffic to and from the management interface VLAN 1.
• Port Fa0/4 monitors ports Fa0/3 and Fa0/6.
Ports Fa0/3, Fa0/4, and Fa0/6 are all configured in VLAN 2. Other ports and the management interface are
configured in the default VLAN 1.
Network Diagram
In order to configure port Fa0/1 as a destination port, the source ports Fa0/2 and Fa0/5, and the management
interface (VLAN 1), select the interface Fa0/1 in the configuration mode:
With this command, every packet that these two ports receive or transmit is also copied to port Fa0/1. Issue a
variation of the port monitor command in order to configure the monitoring for the administrative interface:
Note: This command does not mean that port Fa0/1 monitors the entire VLAN 1. The vlan 1 keyword simply
refers to the administrative interface of the switch.
This example command illustrates that the monitor of a port in a different VLAN is impossible:
In order to finish the configuration, configure another session. This time, use Fa0/4 as a destination SPAN
port:
Issue a show running command, or use the show port monitor command in order to check the configuration:
Port snooping lets you transparently mirror traffic from one or more source ports to a destination port."
Issue the snoop command in order to set up port−based traffic mirroring, or snooping. Issue the no form of
this command in order to disable snooping:
The variable source_port refers to the port that is monitored. The variable snoop_direction is the direction of
traffic on the source port or ports that are monitored: receive, transmit, or both.
8500CSR#configure terminal
8500CSR(config)#interface fastethernet 12/0/15
8500CSR(config−if)#shutdown
8500CSR(config−if)#snoop interface fastethernet 0/0/1 direction both
8500CSR(config−if)#no shutdown
8500CSR#show snoop
Snoop Test Port Name: FastEthernet1/0/4 (interface status=SNOOPING)
Snoop option: (configured=enabled)(actual=enabled)
Snoop direction: (configured=receive)(actual=receive)
Monitored Port Name:
(configured=FastEthernet1/0/3)(actual=FastEthernet1/0/3)
Note: This command is not supported on Ethernet ports in a Catalyst 8540 if you run a multiservice ATM
switch router (MSR) image, such as 8540m−in−mz. Instead, you must use a campus switch router (CSR)
image, such as 8540c−in−mz.
This section is applicable for Cisco Catalyst 4000 Series Switches which includes:
Local SPAN
SPAN features have been added one by one to the CatOS, and a SPAN configuration consists of a single set
span command. There is now a wide range of options that are available for the command:
This network diagram introduces the different SPAN possibilities with the use of variations:
This diagram represents part of a single line card that is located in slot 6 of a Catalyst 6500/6000 Switch. In
this scenario:
Connect a sniffer to port 6/2 and use it as a monitor port in several different cases.
Issue the simplest form of the set span command in order to monitor a single port. The syntax is set span
source_port destination_port .
Monitor a Single Port with SPAN
With this configuration, every packet that is received or sent by port 6/1 is copied on port 6/2. A clear
description of this comes up when you enter the configuration. Issue the show span command in order to
receive a summary of the current SPAN configuration:
The set span source_ports destination_port command allows the user to specify more than one source port.
Simply list all the ports on which you want to implement the SPAN, and separate the ports with commas. The
command−line interpreter also allows you to use the hyphen in order to specify a range of ports. This example
illustrates this ability to specify more than one port. The example uses SPAN on port 6/1 and a range of three
ports, from 6/3 to 6/5:
Note: There can only be one destination port. Always specify the destination port after the SPAN source.
Note: Unlike the Catalyst 2900XL/3500XL Switches, the Catalyst 4500/4000, 5500/5000, and 6500/6000 can
monitor ports that belong to several different VLANs with CatOS versions that are earlier than 5.1. Here, the
mirrored ports are assigned to VLANs 1, 2, and 3.
Eventually, the set span command allows you to configure a port to monitor local traffic for an entire VLAN.
The command is set span source_vlan(s) destination_port .
With this configuration, every packet that enters or leaves VLAN 2 or 3 is duplicated to port 6/2.
Note: The result is exactly the same as if you implement SPAN individually on all the ports that belong to the
VLANs that the command specifies. Compare the Oper Source field and the Admin Source field. The
Admin Source field basically lists all the ports that you have configured for the SPAN session, and the
Oper Source field lists the ports that use SPAN.
Ingress/Egress SPAN
In the example in the Monitor VLANs with SPAN section, traffic that enters and leaves the specified ports is
monitored. The Direction: transmit/receive field shows this. The Catalyst 4500/4000,
5500/5000, and 6500/6000 Series Switches allow you to collect only egress (outbound) or only ingress
(inbound) traffic on a particular port. Add the rx (receive) or tx (transmit) keyword to the end of the
command. The default value is both (tx and rx).
In this example, the session captures all incoming traffic for VLANs 1 and 3 and mirrors the traffic to port
6/2:
Trunks are a special case in a switch because they are ports that carry several VLANs. If a trunk is selected as
a source port, the traffic for all the VLANs on this trunk is monitored.
In this diagram, port 6/5 is now a trunk that carries all VLANs. Imagine that you want to use SPAN on the
traffic in VLAN 2 for ports 6/4 and 6/5. Simply issue this command:
With this configuration, at least, you only monitor traffic that belongs to VLAN 2 from the trunk. The
problem is that now you also receive traffic that you did not want from port 6/3. The CatOS includes another
keyword that allows you to select some VLANs to monitor from a trunk:
This command achieves the goal because you select VLAN 2 on all the trunks that are monitored. You can
specify several VLANs with this filter option.
Note: This filter option is only supported on Catalyst 4500/4000 and Catalyst 6500/6000 Switches. Catalyst
5500/5000 does not support the filter option that is available with the set span command.
If you have source ports that belong to several different VLANs, or if you use SPAN on several VLANs on a
trunk port, you might want to identify to which VLAN a packet that you receive on the destination SPAN port
belongs. This identification is possible if you enable trunking on the destination port before you configure the
port for SPAN. In this way, all packets that are forwarded to the sniffer are also tagged with their respective
VLAN IDs.
Thus far, only a single SPAN session has been created. Each time that you issue a new set span command, the
previous configuration is invalidated. The CatOS now has the ability to run several sessions concurrently, so it
can have different destination ports at the same time. Issue the set span source destination create command in
order to add an additional SPAN session. In this session, port 6/1 to 6/2 is monitored, and at the same time,
VLAN 3 to port 6/3 is monitored:
Now, issue the show span command in order to determine if you have two sessions at the same time:
Additional sessions are created. You need a way to delete some sessions. The command is:
Because there can only be one destination port per session, the destination port identifies a session. Delete the
first session that is created, which is the one that uses port 6/2 as destination:
Issue this command in order to disable all the current sessions in a single step:
This section briefly introduces the options that this document discusses:
• sc0−You specify the sc0 keyword in a SPAN configuration when you need to monitor the traffic to
the management interface sc0. This feature is available on the Catalyst 5500/5000 and 6500/6000
Switches, code version CatOS 5.1 or later.
• inpkts enable/disable −This option is extremely important. As this document states, a port that you
configure as the SPAN destination still belongs to its original VLAN. Packets that are received on a
destination port then enter the VLAN, as if this port were a normal access port. This behavior can be
desired. If you use a PC as a sniffer, you might want this PC to be fully connected to the VLAN.
Nevertheless, the connection can be dangerous if you connect the destination port to other networking
equipment that creates a loop in the network. The destination SPAN port does not run the STP, and
you can end up in a dangerous bridging−loop situation. See the Why Does the SPAN Session Create a
Bridging Loop? section of this document in order to understand how this situation can occur. The
default setting for this option is disable, which means that the destination SPAN port discards packets
that the port receives. This discard protects the port from bridging loops. This option appears in
CatOS 4.2.
• learning enable/disable −This option allows you to disable learning on the destination port. By
default, learning is enabled and the destination port learns MAC addresses from incoming packets that
the port receives. This feature appears in CatOS 5.2 on the Catalyst 4500/4000 and 5500/5000, and in
CatOS 5.3 on the Catalyst 6500/6000.
• multicast enable/disable −As the name suggests, this option allows you to enable or disable the
monitoring of multicast packets. The default is enable. This feature is available on the Catalyst
5500/5000 and 6500/6000, CatOS 5.1 and later.
• spanning port 15/1−On the Catalyst 6500/6000, you can use port 15/1 (or 16/1) as a SPAN source.
The port can monitor the traffic that is forwarded to the Multilayer Switch Feature Card (MSFC). The
port captures traffic that is software−routed or directed to the MSFC.
Remote SPAN
RSPAN Overview
RSPAN allows you to monitor source ports that are spread all over a switched network, not only locally on a
switch with SPAN. This feature appears in CatOS 5.3 in the Catalyst 6500/6000 Series Switches and is added
in the Catalyst 4500/4000 Series Switches in CatOS 6.3 and later.
The functionality works exactly as a regular SPAN session. The traffic that is monitored by SPAN is not
directly copied to the destination port, but flooded into a special RSPAN VLAN. The destination port can then
be located anywhere in this RSPAN VLAN. There can even be several destination ports.
In this example, you configure RSPAN to monitor traffic that host A sends. When A generates a frame that is
destined for B, the packet is copied by an application−specific integrated circuit (ASIC) of the Catalyst
6500/6000 Policy Feature Card (PFC) into a predefined RSPAN VLAN. From there, the packet is flooded to
all other ports that belong to the RSPAN VLAN. All the interswitch links that are drawn here are trunks,
which is a requirement for RSPAN. The only access ports are destination ports, where the sniffers are
connected (here, on S4 and S5).
• S1 is called a source switch. Packets only enter the RSPAN VLAN in switches that are configured as
RSPAN source. Currently, a switch can only be the source for one RSPAN session, which means that
a source switch can only feed one RSPAN VLAN at a time.
• S2 and S3 are intermediate switches. They are not RSPAN sources and do not have destination ports.
A switch can be intermediate for any number of RSPAN sessions.
• S4 and S5 are destination switches. Some of their ports are configured to be destination for an
RSPAN session. Currently, a Catalyst 6500/6000 can have up to 24 RSPAN destination ports, for one
or several different sessions. You can also notice that S4 is both a destination and an intermediate
switch.
• You can see that RSPAN packets are flooded into the RSPAN VLAN. Even switches that are not on
the path to a destination port, such as S2, receive the traffic for the RSPAN VLAN. You can find it
useful to prune this VLAN on such S1−S2 links.
• In order to achieve the flooding, learning is disabled on the RSPAN VLAN.
• In order to prevent loops, the STP has been maintained on the RSPAN VLAN. Therefore, RSPAN
cannot monitor Bridge Protocol Data Units (BPDUs).
The information in this section illustrates the setup of these different elements with a very simple RSPAN
design. S1 and S2 are two Catalyst 6500/6000 Switches. In order to monitor some S1 ports or VLANs from
S2, you must set up a dedicated RSPAN VLAN. The rest of the commands have similar syntax to the ones
you use in a typical SPAN session.
In order to begin, put the same VLAN Trunk Protocol (VTP) domain on each switch and configure one side as
trunking desirable. VTP negotiation does the rest. Issue this command on S1:
An RSPAN session needs a specific RSPAN VLAN. You must create this VLAN. You cannot convert an
existing VLAN into an RSPAN VLAN. This example uses the VLAN 100:
Issue this command on one switch that is configured as a VTP server. The knowledge of RSPAN VLAN 100
is propagated automatically in the whole VTP domain.
Configuration of Port 5/2 of S2 as an RSPAN Destination Port
In this example, incoming traffic that enters S1 via port 6/2 is monitored. Issue this command:
All incoming packets on port 6/2 are now flooded on the RSPAN VLAN 100 and reach the destination port
that is configured on S1 via the trunk.
The show rspan command gives a summary of the current RSPAN configuration on the switch. Again, there
can only be one source RSPAN session at one time.
You use several command lines in order to configure the source and the destination with RSPAN. Apart from
this difference, SPAN and RSPAN really behave in the same way. You can even use RSPAN locally, on a
single switch, if you want to have several destination SPAN ports.
This table provides a short summary of the current restrictions on the number of possible SPAN sessions:
Catalyst
Feature 4500/4000 Catalyst Catalyst
Range of 5500/5000 6500/6000
Switches Range of Range of
Switches Switches
Rx or both
SPAN
sessions
5 1 2
Tx SPAN
sessions
5 4 4
Mini Protocol
Analyzer
sessions
Not supported Not supported 1
Rx, Tx, or
both RSPAN
1 Supervisor
source
Engine 720
sessions
5 Not supported supports two
RSPAN source
5 Not supported 24
sessions.
RSPAN
destination
Total sessions
5 5 30
• The Catalyst 2950 Switches can have only one SPAN session active at a time and can monitor only
source ports. These switches cannot monitor VLANs.
• The Catalyst 2950 and 3550 Switches can forward traffic on a destination SPAN port in Cisco IOS
Software Release 12.1(13)EA1 and later.
• The Catalyst 3550, 3560, and 3750 Switches can support up to two SPAN sessions at a time and can
monitor source ports as well as VLANs.
• The Catalyst 2970, 3560, and 3750 Switches do not require the configuration of a reflector port when
you configure an RSPAN session.
• The Catalyst 3750 Switches support session configuration with the use of source and destination ports
that reside on any of the switch stack members.
• Only one destination port is allowed per SPAN session, and the same port cannot be a destination port
for multiple SPAN sessions. Therefore, you cannot have two SPAN sessions that use the same
destination port.
The SPAN feature configuration commands are similar on the Catalyst 2950 and Catalyst 3550. However, the
Catalyst 2950 cannot monitor the VLANs. You can configure the SPAN, as in this example:
C2950#configure terminal
C2950(config)#
C2950(config)#monitor session 1 source interface fastethernet 0/2
C2950(config)#
You can also configure a port as a destination for local SPAN and RSPAN for the same VLAN traffic. In
order to monitor traffic for a particular vlan that resides in two switches directly connected, configure these
commands on the switch that has the destination port. In this example, we monitor traffic from VLAN 5 that
is spread across two switches:
In the previous example a port was configured as a destination port for both local SPAN and the RSPAN to
monitor traffic for the same VLAN that resides in two switches.
Note: Unlike the 2900XL and 3500XL Series Switches, the Catalyst 2940, 2950, 2955, 2960, 2970, 3550,
3560, 3560−E, 3750, and 3750−E Series Switches support SPAN on source port traffic in the Rx direction
only (Rx SPAN or ingress SPAN), in the Tx direction only (Tx SPAN or egress SPAN), or both.
Note: The commands in the configuration are not supported on the Catalyst 2950 with Cisco IOS Software
Release 12.0(5.2)WC(1) or any software that is earlier than Cisco IOS Software Release 12.1(6)EA2. Refer to
the Enabling Switch Port Analyzer section of Managing Switches in order to configure SPAN on a Catalyst
2950 with software that is earlier than Cisco IOS Software Release 12.1(6)EA2.
Note: Catalyst 2950 Switches that use Cisco IOS Software Release 12.1.(9)EA1d and earlier releases in the
Cisco IOS Software Release 12.1 train support SPAN. However, all packets that are seen on the SPAN
destination port (connected to the sniffing device or PC) have an IEEE 802.1Q tag, even though the SPAN
source port (monitored port) might not be an 802.1Q trunk port. If the sniffing device or PC network interface
card (NIC) does not understand 802.1Q−tagged packets, the device can drop the packets or have difficulty as
it tries to decode the packets. The ability to see the 802.1Q−tagged frames is important only when the SPAN
source port is a trunk port. With Cisco IOS Software Release 12.1(11)EA1 and later, you can enable and
disable tagging of the packets at the SPAN destination port. Issue the monitor session session_number
destination interface interface_id encapsulation dot1q command in order to enable encapsulation of the
packets at the destination port. If you do not specify the encapsulation keyword, the packets are sent
untagged, which is the default in Cisco IOS Software Release 12.1(11)EA1 and later.
Feature
Catalyst 2950/3550
Ingress (inpkts)
enable/disable option Cisco IOS Software Release
12.1(12c)EA1
RSPAN Cisco IOS Software Release
12.1(12c)EA1
Refer to these configuration guides for more information on the configuration of SPAN and RSPAN:
Configuration Example
You can configure the SPAN, as in this example:
4507R#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Session 1−−−−−−−−−
Type : Local Session
Source Ports :
Both : Fa4/2
Destination Ports : Fa4/3
4507R#
Feature Summary and Limitations
This table summarizes the different features that have been introduced and provides the minimum Cisco IOS
Software release that is necessary to run the feature on the specified platform:
Catalyst 4500/4000
Feature Catalyst
(Cisco IOS
6500/6000 (Cisco
Software)
IOS Software)
Ingress (inpkts)
enable/disable
option Cisco IOS Software Not currently
Release 12.1(19)EW supported1
Cisco IOS
RSPAN Cisco IOS Software
Software Release
Release 12.1(20)EW
12.1(13)E
1
The feature is currently not available, and the availability of these features is typically not published until
release.
Note: The SPAN feature of Cisco Catalyst 6500/6000 Series Switches has a limitation with respect to PIM
Protocol. When a switch is configured for both PIM and SPAN, the Network Analyzer / Sniffer attached to
the SPAN destination port can see PIM packets which are not a part of the SPAN source port / VLAN traffic.
This issue occurs due to a limitation in the packet forwarding architecture of the switch. The SPAN
destination port does not perform any check to verify the source of the packets. This issue is also documented
in Cisco bug ID CSCdy57506 (registered customers only).
This table provides a short summary of the current restrictions on the number of possible SPAN and RSPAN
sessions:
Refer to Local SPAN, RSPAN, and ERSPAN Session Limits for Catalyst 6500/6000 switches running Cisco
IOS software.
In the Catalyst 6500 Series, it is important to note that egress SPAN is done on the supervisor. This allows all
traffic subject to egress SPAN to be sent across the fabric to the supervisor and then to the SPAN destination
port, which can use significant system resources and affect user traffic. Ingress SPAN will be done on ingress
modules so SPAN performance would be the sum of all participating replication engines. The performance of
the SPAN feature depends on the packet size and the type of ASIC available in the replication engine.
With releases earlier than Cisco IOS Software Release 12.2(33)SXH, a port−channel interface, an
EtherChannel, cannot be a SPAN destination. With Cisco IOS Software Release 12.2(33)SXH and later, an
EtherChannel can be a SPAN destination. Destination EtherChannels do not support the Port Aggregation
Control Protocol (PAgP) or Link Aggregation Control Protocol (LACP) EtherChannel protocols; only the on
mode is supported, with all EtherChannel protocol support disabled.
The ports of the switch are attached to satellites that communicate to a switching fabric via radial channels.
On the top, all the satellites are interconnected via a high−speed notify ring that is dedicated to signaling
traffic.
When a satellite receives a packet from a port, the packet is split into cells and sent to the switching fabric via
one or more channels. The packet is then stored in the shared memory. Each satellite has knowledge of the
destination ports. In the diagram in this section, satellite 1 knows that the packet X is to be received by
satellites 3 and 4. Satellite 1 sends a message to the other satellites via the notify ring. Then, satellites 3 and 4
can start to retrieve the cells from the shared memory via their radial channels and can eventually forward the
packet. Because the source satellite knows the destination, this satellite also transmits an index that specifies
the number of times that this packet is downloaded by the other satellites. Each time a satellite retrieves the
packet from the shared memory, this index is decremented. When the index reaches 0, the shared memory can
be released.
Performance Impact
In order to monitor some ports with SPAN, a packet must be copied from the data buffer to a satellite an
additional time. The impact on the high−speed switching fabric is negligible.
The monitoring port receives copies of transmitted and received traffic for all monitored ports. In this
architecture, a packet that is destined for multiple destinations is stored in memory until all copies are
forwarded. If the monitoring port is 50 percent oversubscribed for a sustained period of time, the port likely
becomes congested and holds part of the shared memory. There is a possibility that one or more of the ports
that are monitored also experience a slowdown.
The Catalyst 4500/4000 is based on a shared−memory switching fabric. This diagram is a high−level
overview of the path of a packet through the switch. The actual implementation is, in fact, much more
complex:
On a Catalyst 4500/4000, you can distinguish the data path. The data path corresponds to the real transfer of
data within the switch, from the control path, where all the decisions are taken.
When a packet enters the switch, a buffer is allocated in the Packet Buffer Memory (a shared memory). A
packet structure that points to this buffer is initialized in the Packet Descriptor Table (PDT). While the data is
copied into shared memory, the control path determines where to switch the packet. In order to make this
determination, a hash value is computed from this information:
• The packet source address
• Destination address
• VLAN
• Protocol type
• Input port
• Class of service (CoS) (either IEEE 802.1p tag or port default)
This value is used to find the Virtual Path Index (VPI) of a path structure in the Virtual Path Table (VPT).
This virtual path entry in the VPT holds several fields that relate to this particular flow. The fields include the
destination ports. The packet structure in the PDT is now updated with a reference to the virtual path and
counter. In the example in this section, the packet is to be transmitted to two different ports, so the counter
initializes to 2. Finally, the packet structure is added to the output queue of the two destination ports. From
there, the data copies from the shared memory into the output buffer of the port, and the packet structure
counter decrements. When it reaches 0, the shared memory buffer releases.
Performance Impact
With use of the SPAN feature, a packet must be sent to two different ports, as in the example in the
Architecture Overview section. The send of the packet to two ports is not an issue because the switching
fabric is nonblocking. If the destination SPAN port is congested, packets are dropped in the output queue and
are correctly released from the shared memory. Therefore, there is no impact on the switch operation.
On the Catalyst 5500/5000 and 6500/6000 Series Switches, a packet that is received on a port is transmitted
on the internal switching bus. Every line card in the switch starts to store this packet in internal buffers. At the
same time, the Encoded Address Recognition Logic (EARL) receives the header of the packet and computes a
result index. EARL sends the result index to all the line cards via the result bus. The knowledge of this index
allows the line card to decide individually whether it should flush or transmit the packet as the line card
receives the packet in its buffers.
Performance Impact
Whether one or several ports eventually transmit the packet has absolutely no influence on the switch
operation. Therefore, when you consider this architecture, the SPAN feature has no impact on the
performance.
Caution: This issue is still in the current implementation of the CatOS. Be very careful of the port that you
choose as a SPAN destination.
When you configure a SPAN session to monitor the port, the destination interface shows the state down
(monitoring), by design. The interface shows the port in this state in order to make it evident that the port is
currently not usable as a production port. The port as up/down monitoring is normal.
The administrator achieves the goal. Each single packet that a core switch receives on VLAN 1 is duplicated
on the SPAN port and forwarded upward to the hub. A sniffer eventually captures the traffic.
The only problem is that the traffic is also reinjected into core 2 through the destination SPAN port. The
reinjection of the traffic into core 2 creates a bridging loop in VLAN 1. Remember that a destination SPAN
port does not run STP and is not able to prevent such a loop.
Note: Because of the introduction of the inpkts (input packets) option on the CatOS, a SPAN destination port
drops any incoming packet by default, which prevents this failure scenario. But, the potential issue is still
present on the Catalyst 2900XL/3500XL Series Switches.
Note: Even when the inpkts option prevents the loop, the configuration that this section shows can cause some
problems in the network. Network problems can occur because of MAC address learning issues that are
associated with learning enabled on the destination port.
Can You Have Several SPAN Sessions Run at the Same Time?
On the Catalyst 2900XL/3500XL Series Switches, the number of destination ports that are available on the
switch is the only limit to the number of SPAN sessions.
On the Catalyst 2950 Series Switches, you can have only one assigned monitor port at any time. If you select
another port as the monitor port, the previous monitor port is disabled, and the newly selected port becomes
the monitor port.
On the Catalyst 4500/4000, 5500/5000, and 6500/6000 Switches with CatOS 5.1 and later, you can have
several concurrent SPAN sessions. See the Create Several Simultaneous Sessions and Feature Summary and
Limitations sections of this document.
Supervisor Engines have a limitation of SPAN sessions. Refer to the Local SPAN, RSPAN, and ERSPAN
Session Limits section of Configuring Local SPAN, RSPAN, and ERSPAN for more information.
Cannot Delete a SPAN Session on the VPN Service Module, with the
Error "% Session [Session No:] Used by Service Module"
With this issue, the Virtual Private Network (VPN) module is inserted into the chassis, where a switch fabric
module has already been inserted. The Cisco IOS Software automatically creates a SPAN session for the VPN
service module in order to handle the multicast traffic.
Issue this command in order to delete the SPAN session that the software creates for the VPN service module:
Switch(config)#no monitor session session_number service−module
Note: If you delete the session, the VPN service module drops the multicast traffic.
If the switch receives a corrupted packet, the ingress port usually drops the packet. Therefore, you do not see
the packet on the egress port. A switch is not completely transparent with regard to the capture of traffic.
Similarly, when you see a corrupted packet on your sniffer in the scenario in this section, you know that the
errors were generated at step 3, on the egress segment.
If you think that a device sends corrupted packets, you can choose to put the sending host and the sniffer
device on a hub. The hub does not perform any error checks. Therefore, unlike the switch, the hub does not
drop the packets. In this way, you can view the packets.
Cat6K#show monitor
Session 1
−−−−−−−−−
Type : Service Module Session
When a firewall blade is in the Catalyst 6500 chassis, this session is automatically installed for the support of
hardware multicast replication because an FWSM cannot replicate multicast streams. If multicast streams
sourced behind the FWSM must be replicated at Layer 3 to multiple line cards, the automatic session copies
the traffic to the supervisor through a fabric channel.
If you have a multicast source that generates a multicast stream from behind the FWSM, you need the SPAN
reflector. If you place the multicast source on the outside VLAN, the SPAN reflector is not necessary. The
SPAN reflector is incompatible with bridging BPDUs through the FWSM. You can use the no monitor
session service module command in order to disable the SPAN reflector.
Can a SPAN and an RSPAN Session Have the Same ID Within the Same
Switch?
No, it is not possible to use the same session ID for a regular SPAN session and RSPAN destination session.
Each SPAN and RSPAN session must have a different session ID.
ERSPAN consists of an ERSPAN source session, routable ERSPAN GRE−encapsulated traffic, and an
ERSPAN destination session. You separately configure ERSPAN source sessions and destination sessions on
different switches.
• Supervisor 720 with PFC3B or PFC3BXL running Cisco IOS Software Release 12.2(18)SXE or later
• Supervisor 720 with PFC3A that has hardware version 3.2 or later and running Cisco IOS Software
Release 12.2(18)SXE or later
Refer to Configuring Local SPAN, Remote SPAN (RSPAN), and Encapsulated RSPAN − Catalyst 6500
Series Cisco IOS Software Configuration Guide, 12.2SX for more information on ERSPAN.
Can a RSPAN Source Session and the Destination Session Exist on the
Same Catalyst Switch?
No. RSPAN does not work when the RSPAN source session and the RSPAN destination session are on the
same switch.
If an RSPAN source session is configured with a particular RSPAN VLAN and an RSPAN destination
session for that RSPAN VLAN is configured on the same switch, then the RSPAN destination session's
destination port will not transmit the captured packets from the RSPAN source session due to hardware
limitations. This is not supported on the 4500 Series and 3750 Series Switches. This issue is documented in
Cisco bug ID CSCeg08870 (registered customers only) .
This is an example:
When ingress is enabled, the SPAN destination port accepts incoming packets, which are potentially tagged
that depends on the specified encapsulation mode, and switches them normally. When you configure a SPAN
destination port, you can specify whether or not the ingress feature is enabled and what VLAN to use to
switch untagged ingress packets. The specification of an ingress VLAN is not required when ISL
encapsulation is configured, as all ISL encapsulated packets that have VLAN tags. Although the port is STP
forwarding, it does not participate in the STP, so use caution when you configure this feature lest a
spanning−tree loop be introduced in the network. When both ingress and a trunk encapsulation are specified
on a SPAN destination port, the port goes forwarding in all active VLANs. The configuration of a
non−existent VLAN as an ingress VLAN is not allowed.
monitor session session_number destination interface interface [encapsulation {isl | dot1q}] ingress [vlan
vlan_IDs]
This example shows how to configure a destination port with 802.1q encapsulation and ingress packets with
the use of the native VLAN 7:
With this configuration, traffic from SPAN sources associated with session 1 are copied out of interface Fast
Ethernet 5/48, with 802.1q encapsulation. Incoming traffic is accepted and switched, with untagged packets
classified into VLAN 7.
Related Information
• How to configure SPAN and RSPAN on Cisco Catalyst 4500 switches that run Cisco IOS Software
• A SPAN destination port is shown as "not connected" and does not communicate with the rest of
the network
• Switches Product Support
• LAN Switching Technology Support
• Technical Support & Documentation − Cisco Systems