Cisco Systems WSC4500X24XIPB Switch User Manual


 
1-11
Software Configuration Guide—Release 12.2(25)SG
OL-7659-03
Chapter 1 Product Overview
Management Features
NetFlow Statistics
NetFlow Statistics is a global traffic monitoring feature that allows flow-level monitoring of all
IPv4-routed traffic through the switch. Both routed and switched IP flows are supported.
For more information on NetFlow statistics, see Chapter 38, “Configuring NetFlow.”
Secure Shell
Secure Shell (SSH) is a program that enables you to log into another computer over a network, to execute
commands remotely, and to move files from one machine to another. The switch may not initiate SSH
connections: SSH will be limited to providing a remote login session to the switch and will only function
as a server.
Simple Network Management Protocol
Simple Network Management Protocol (SNMP) facilitates the exchange of management information
between network devices. The Catalyst 4500 series switch supports these SNMP types and
enhancements:
SNMP—A full Internet standard
SNMP v2—Community-based administrative framework for version 2 of SNMP
SNMP v3—Security framework with three levels: noAuthNoPriv, authNoPriv, and authPriv
(available only on a crypto image, like cat4000-i5k91s-mz)
SNMP trap message enhancements—Additional information with certain SNMP trap messages,
including spanning-tree topology change notifications and configuration change notifications
For information on SNMP, refer to the Cisco IOS Configuration Fundamentals Configuration Guide and
Cisco IOS Configuration Fundamentals Command Reference at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/index.htm
SPAN and RSPAN
Switched Port Analyzer (SPAN) allows you to monitor traffic on any port for analysis by a network
analyzer or Remote Monitoring (RMON) probe. You also can do the following:
Configure ACLs on SPAN sessions.
Allow incoming traffic on SPAN destination ports to be switched normally.
Explicitly configure the encapsulation type of packets that are spanned out of a destination port.
Restrict ingress sniffing depending on whether the packet is unicast, multicast, or broadcast, and
depending on whether the packet is valid.
Mirror packets sent to or from the CPU out of a SPAN destination port for troubleshooting purposes.
For information on SPAN, see Chapter 37, “Configuring SPAN and RSPAN.”