The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
To create a new Ethernet Switched Port Analyzer (SPAN) or a Remote Switched Port Analyzer (RSPAN) session configuration for analyzing traffic between ports or add to an existing session configuration, use the monitor session global configuration command. To clear SPAN or RSPAN sessions, use the no form of this command.
monitor session session-number { destination | filter | source}
no monitor session { session-number [ destination | filter | source] | all | local | range session-range | remote}
The session number identified with the SPAN or RSPAN session. The range is 1 to 68. However if this switch is stacked with Catalyst 2960-S switches, the range is 1 to 66. |
|
Clears all local monitor sessions. |
|
range session-range |
Clears monitor sessions in the specified range. |
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
You can set a combined maximum of four local SPAN sessions and RSPAN source sessions. You can have a total of 68 SPAN and RSPAN sessions on a switch or switch stack. However if this switch is stacked with Catalyst 2960-S switches, you are limited to a combined maximum of two local SPAN sessions and RSPAN source sessions, and the range is 1 to 66.
A private-VLAN port cannot be configured as a SPAN destination port.
You can verify your settings by entering the show monitor privileged EXEC command. You can display SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config privileged EXEC command. SPAN information appears near the end of the output.
This example shows how to create a local SPAN session 1 to monitor traffic on Po13 (an EtherChannel port) and limit SPAN traffic in the session only to VLAN 1281. Egress traffic replicates the source; ingress forwarding is not enabled.
Switch(config)# monitor session 1 source interface Po13 Switch(config)# monitor session 1 filter vlan 1281 Switch(config)# monitor session 1 destination interface GigabitEthernet2/0/36 encapsulation replicate Switch(config)# monitor session 1 destination interface GigabitEthernet3/0/36 encapsulation replicate
The following is the output of a show monitor session all command after completing these setup instructions:
Switch# show monitor session all
Session 1
---------
Type : Local Session
Source Ports :
Both : Po13
Destination Ports : Gi2/0/36,Gi3/0/36
Encapsulation : Replicate
Ingress : Disabled
Filter VLANs : 1281
...
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) destination session, to enable ingress traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance), and to add or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use the monitor session destination global configuration command. To remove the SPAN or RSPAN session or to remove destination interfaces from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number destination { interface interface-id [ , | -] [ encapsulation { replicate | dot1q} ] { ingress [ dot1q | untagged] } | { remote} vlan vlan-id
no monitor session session-number destination { interface interface-id [ , | -] [ encapsulation { replicate | dot1q} ] { ingress [ dot1q | untagged] } | { remote} vlan vlan-id
No monitor sessions are configured.
If encapsulation replicate is not specified on a local SPAN destination port, packets are sent in native form with no encapsulation tag.
Ingress forwarding is disabled on destination ports.
You can specify all, local, range session-range, or remote with the no monitor session command to clear all SPAN and RSPAN, all local SPAN, a range, or all RSPAN sessions.
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
You can set a combined maximum of four local SPAN sessions and RSPAN source sessions. You can have a total of 68 SPAN and RSPAN sessions on a switch or switch stack. However if this switch is stacked with Catalyst 2960-S switches, you are limited to a combined maximum of two local SPAN sessions and RSPAN source sessions, and the range is 1 to 66.
A SPAN or RSPAN destination must be a physical port.
You can have a maximum of 64 destination ports on a switch or a switch stack.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination port.
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
EtherChannel ports cannot be configured as SPAN or RSPAN destination ports. A physical port that is a member of an EtherChannel group can be used as a destination port, but it cannot participate in the EtherChannel group while it is as a SPAN destination.
A private-VLAN port cannot be configured as a SPAN destination port.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for more than one session at a time.
You can enable IEEE 802.1x authentication on a port that is a SPAN or RSPAN destination port; however, IEEE 802.1x authentication is disabled until the port is removed as a SPAN destination. If IEEE 802.1x authentication is not available on the port, the switch returns an error message. You can enable IEEE 802.1x authentication on a SPAN or RSPAN source port.
If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at Layer 2.
Destination ports can be configured to function in these ways:
When you enter monitor session session_number destination interface interface-id with no other keywords, egress encapsulation is untagged, and ingress forwarding is not enabled.
When you enter monitor session session_number destination interface interface-id ingress, egress encapsulation is untagged; ingress encapsulation depends on the keywords that follow—dot1q or untagged.
When you enter monitor session session_number destination interface interface-id encapsulation replicate with no other keywords, egress encapsulation replicates the source interface encapsulation; ingress forwarding is not enabled. (This applies to local SPAN only; RSPAN does not support encapsulation replication.)
When you enter monitor session session_number destination interface interface-id encapsulation replicate ingress, egress encapsulation replicates the source interface encapsulation; ingress encapsulation depends on the keywords that follow—dot1q or untagged. (This applies to local SPAN only; RSPAN does not support encapsulation replication.)
You can verify your settings by entering the show monitor privileged EXEC command. You can display SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config privileged EXEC command. SPAN information appears near the end of the output.
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source port 1 on stack member 1 to destination port 2 on stack member 2:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to delete a destination port from an existing local SPAN session:
Switch(config)# no monitor session 2 destination interface gigabitethernet1/0/2
This example shows how to configure RSPAN source session 1 to monitor a source interface and to configure the destination RSPAN VLAN 900:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 Switch(config)# monitor session 1 destination remote vlan 900 Switch(config)# end
This example shows how to configure an RSPAN destination session 10 in the switch receiving the monitored traffic:
Switch(config)# monitor session 10 source remote vlan 900 Switch(config)# monitor session 10 destination interface gigabitethernet1/0/2
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security device that supports IEEE 802.1Q encapsulation. Egress traffic replicates the source; ingress traffic uses IEEE 802.1Q encapsulation.
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation dot1q ingress dot1q vlan 5
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security device that does not support encapsulation. Egress traffic and ingress traffic are untagged.
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress untagged vlan 5
To start a new flow-based SPAN (FSPAN) session or flow-based RSPAN (FRSPAN) source or destination session, or to limit (filter) SPAN source traffic to specific VLANs, use the monitor session filter global configuration command. To remove filters from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number filter { vlan vlan-id [ , | -] }
no monitor session session-number filter { vlan vlan-id [ , | -] }
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
You can set a combined maximum of four local SPAN sessions and RSPAN source sessions. You can have a total of 68 SPAN and RSPAN sessions on a switch or switch stack. However if this switch is stacked with Catalyst 2960-S switches, you are limited to a combined maximum of two local SPAN sessions and RSPAN source sessions, and the range is 1 to 66.
You can monitor traffic on a single VLAN or on a series or range of ports or VLANs. You select a series or range of VLANs by using the [, | -] options.
If you specify a series of VLANs, you must enter a space before and after the comma. If you specify a range of VLANs, you must enter a space before and after the hyphen (-).
VLAN filtering refers to analyzing network traffic on a selected set of VLANs on trunk source ports. By default, all VLANs are monitored on trunk source ports. You can use the monitor session session_number filter vlan vlan-id command to limit SPAN traffic on trunk source ports to only the specified VLANs.
VLAN monitoring and VLAN filtering are mutually exclusive. If a VLAN is a source, VLAN filtering cannot be enabled. If VLAN filtering is configured, a VLAN cannot become a source.
You can verify your settings by entering the show monitor privileged EXEC command. You can display SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config privileged EXEC command. SPAN information appears near the end of the output.
This example shows how to limit SPAN traffic in an existing session only to specific VLANs:
Switch(config)# monitor session 1 filter vlan 100 - 110
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source port 1 on stack member 1 to destination port 2 on stack member 2 and to filter IPv4 traffic using access list number 122 in an FSPAN session:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2 Switch(config)# monitor session 1 filter ip access-group 122
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) source session, or to add or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use the monitor session source global configuration command. To remove the SPAN or RSPAN session or to remove source interfaces from the SPAN or RSPAN session, use the no form of this command.
monitor session session_number source { interface interface-id [ , | -] [ both | rx | tx] | [ remote] vlan vlan-id [ , | -] [ both | rx | tx]}
no monitor session session_number source { interface interface-id [ , | -] [ both | rx | tx] | [ remote] vlan vlan-id [ , | -] [ both | rx | tx]}
No monitor sessions are configured.
On a source interface, the default is to monitor both received and transmitted traffic.
On a trunk interface used as a source port, all VLANs are monitored.
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Traffic that enters or leaves source ports or source VLANs can be monitored by using SPAN or RSPAN. Traffic routed to source ports or source VLANs cannot be monitored.
You can set a combined maximum of four local SPAN sessions and RSPAN source sessions. You can have a total of 68 SPAN and RSPAN sessions on a switch or switch stack. However if this switch is stacked with Catalyst 2960-S switches, you are limited to a combined maximum of two local SPAN sessions and RSPAN source sessions, and the range is 1 to 66.
A source can be a physical port, a port channel, or a VLAN.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination port.
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
You can monitor individual ports while they participate in an EtherChannel, or you can monitor the entire EtherChannel bundle by specifying the port-channel number as the RSPAN source interface.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for more than one session at a time.
You can enable IEEE 802.1x authentication on a SPAN or RSPAN source port.
You can verify your settings by entering the show monitor privileged EXEC command. You can display SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config privileged EXEC command. SPAN information appears near the end of the output.
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source port 1 on stack member 1 to destination port 2 on stack member 2:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to configure RSPAN source session 1 to monitor multiple source interfaces and to configure the destination RSPAN VLAN 900.
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 Switch(config)# monitor session 1 source interface port-channel 2 tx Switch(config)# monitor session 1 destination remote vlan 900 Switch(config)# end
To display information about all Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) sessions, use the show monitor command in EXEC mode.
show monitor [ session { session_number | all | local | range list | remote} [ detail]]
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
The output is the same for the show monitor command and the show monitor session all command.
Maximum number of SPAN source sessions: 4 (applies to source and local sessions) However if this switch is stacked with Catalyst 2960-S switches, you are limited to a combined maximum of two local SPAN sessions and RSPAN source sessions.
This is an example of output for the show monitor user EXEC command:
Switch# show monitor Session 1 --------- Type : Local Session Source Ports : RX Only : Gi4/0/1 Both : Gi4/0/2-3,Gi4/0/5-6 Destination Ports : Gi4/0/20 Encapsulation : Replicate Ingress : Disabled Session 2 --------- Type : Remote Source Session Source VLANs : TX Only : 10 Both : 1-9 Dest RSPAN VLAN : 105
This is an example of output for the show monitor user EXEC command for local SPAN source session 1:
Switch# show monitor session 1 Session 1 --------- Type : Local Session Source Ports : RX Only : Gi4/0/1 Both : Gi4/0/2-3,Gi4/0/5-6 Destination Ports : Gi4/0/20 Encapsulation : Replicate Ingress : Disabled
This is an example of output for the show monitor session all user EXEC command when ingress traffic forwarding is enabled:
Switch# show monitor session all Session 1 --------- Type : Local Session Source Ports : Both : Gi4/0/2 Destination Ports : Gi4/0/3 Encapsulation : Native Ingress : Enabled, default VLAN = 5 Ingress encap : DOT1Q Session 2 --------- Type : Local Session Source Ports : Both : Gi4/0/8 Destination Ports : Gi4/012 Encapsulation : Replicate Ingress : Enabled, default VLAN = 4 Ingress encap : Untagged
To enable the switch to send Simple Network Management Protocol (SNMP) notifications for various traps or inform requests to the network management system (NMS), use the snmp-server enable traps command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps [ bridge | cluster | config | copy-config | cpu threshold | entity | envmon | errdisable | flash | fru-ctrl | hsrp | ipmulticast | mac-notification | msdp | ospf | pim | port-security | rtr | snmp | storm-control | stpx | syslog | tty | vlan-membership | vlancreate | vlandelete | vtp ]
no snmp-server enable traps [ bridge | cluster | config | copy-config | cpu threshold | entity | envmon | errdisable | flash | fru-ctrl | hsrp | ipmulticast | mac-notification | msdp | ospf | pim | port-security | rtr | snmp | storm-control | stpx | syslog | tty | vlan-membership | vlancreate | vlandelete | vtp ]
bridge |
(Optional) Enables SNMP STP Bridge MIB traps.* |
cluster |
(Optional) Enables SNMP cluster traps. |
config |
(Optional) Enables SNMP configuration traps. |
copy-config |
(Optional) Enables SNMP copy-configuration traps. |
cpu threshold |
(Optional) Enables CPU related traps.* |
entity |
(Optional) Enables SNMP entity traps. |
envmon |
(Optional) Enables SNMP environmental monitor traps.* |
errdisable |
(Optional) Enables SNMP errdisable notification traps.* |
flash |
(Optional) Enables SNMP FLASH notification traps.* |
fru-ctrl |
(Optional) Generates entity field-replaceable unit (FRU) control traps. In a switch stack, this trap refers to the insertion or removal of a switch in the stack. |
hsrp |
(Optional) Enables Hot Standby Router Protocol (HSRP) traps. |
ipmulticast |
(Optional) Enables IP multicast routing traps. |
mac-notification |
(Optional) Enables SNMP MAC Notification traps.* |
msdp |
(Optional) Enables Multicast Source Discovery Protocol (MSDP) traps. |
ospf |
(Optional) Enables Open Shortest Path First (OSPF) traps. |
pim |
(Optional) Enables Protocol-Independent Multicast (PIM) traps. |
port-security |
(Optional) Enables SNMP port security traps.* |
rtr |
(Optional) Enables SNMP Response Time Reporter (RTR) traps. |
snmp |
(Optional) Enables SNMP traps.* |
storm-control |
(Optional) Enables SNMP storm-control trap parameters.* |
stpx |
(Optional) Enables SNMP STPX MIB traps.* |
syslog |
(Optional) Enables SNMP syslog traps. |
tty |
(Optional) Sends TCP connection traps. This is enabled by default. |
vlan-membership |
(Optional) Enables SNMP VLAN membership traps. |
vlancreate |
(Optional) Enables SNMP VLAN-created traps. |
vlandelete |
(Optional) Enables SNMP VLAN-deleted traps. |
vtp |
(Optional) Enables VLAN Trunking Protocol (VTP) traps. |
The sending of SNMP traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
The command options marked with an asterisk in the table above have subcommands. For more information on these subcommands, see the Related Commands section below.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
When supported, use the snmp-server enable traps command to enable sending of traps or informs.
Note | Though visible in the command-line help strings, the fru-ctrl, insertion, and removal keywords are not supported on the switch. The snmp-server enable informs global configuration command is not supported. To enable the sending of SNMP inform notifications, use the snmp-server enable traps global configuration command combined with the snmp-server host host-addr informs global configuration command. |
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to enable more than one type of SNMP trap:
Switch(config)# snmp-server enable traps cluster Switch(config)# snmp-server enable traps config Switch(config)# snmp-server enable traps vtp
To generate STP bridge MIB traps, use the snmp-server enable traps bridge command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps bridge [ newroot] [ topologychange]
no snmp-server enable traps bridge [ newroot] [ topologychange]
newroot |
(Optional) Enables SNMP STP bridge MIB new root traps. |
topologychange |
(Optional) Enables SNMP STP bridge MIB topology change traps. |
The sending of bridge SNMP traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to send bridge new root traps to the NMS:
Switch(config)# snmp-server enable traps bridge newroot
To enable CPU notifications, use the snmp-server enable traps cpu command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps cpu [ threshold]
no snmp-server enable traps cpu [ threshold]
threshold |
(Optional) Enables CPU threshold notification. |
The sending of CPU notifications is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to generate CPU threshold notifications:
Switch(config)# snmp-server enable traps cpu threshold
To enable SNMP environmental traps, use the snmp-server enable traps envmon command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps envmon [ fan] [ shutdown] [ status] [ supply] [ temperature]
no snmp-server enable traps envmon [ fan] [ shutdown] [ status] [ supply] [ temperature]
fan |
(Optional) Enables fan traps. |
shutdown |
(Optional) Enables environmental monitor shutdown traps. |
status |
(Optional) Enables SNMP environmental status-change traps. |
supply |
(Optional) Enables environmental monitor power-supply traps. |
temperature |
(Optional) Enables environmental monitor temperature traps. |
The sending of environmental SNMP traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to generate fan traps:
Switch(config)# snmp-server enable traps envmon fan
To enable SNMP notifications of error-disabling, use the snmp-server enable traps errdisable command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps errdisable [ notification-rate number-of-notifications]
no snmp-server enable traps errdisable [ notification-rate number-of-notifications]
notification-rate number-of-notifications |
(Optional) Specifies number of notifications per minute as the notification rate. Accepted values are from 0 to 10000. |
The sending of SNMP notifications of error-disabling is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to set the number SNMP notifications of error-disabling to 2:
Switch(config)# snmp-server enable traps errdisable notification-rate 2
To enable SNMP flash notifications, use the snmp-server enable traps flash command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps flash [ insertion] [ removal]
no snmp-server enable traps flash [ insertion] [ removal]
insertion |
(Optional) Enables SNMP flash insertion notifications. |
removal |
(Optional) Enables SNMP flash removal notifications. |
The sending of SNMP flash notifications is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to generate SNMP flash insertion notifications:
Switch(config)# snmp-server enable traps flash insertion
To enable SNMP MAC notification traps, use the snmp-server enable traps mac-notification command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps mac-notification [ change] [ move] [ threshold]
no snmp-server enable traps mac-notification [ change] [ move] [ threshold]
change |
(Optional) Enables SNMP MAC change traps. |
move |
(Optional) Enables SNMP MAC move traps. |
threshold |
(Optional) Enables SNMP MAC threshold traps. |
The sending of SNMP MAC notification traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to generate SNMP MAC notification change traps:
Switch(config)# snmp-server enable traps mac-notification change
To enable SNMP port security traps, use the snmp-server enable traps port-security command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps port-security [ trap-rate value]
no snmp-server enable traps port-security [ trap-rate value]
trap-rate value |
(Optional) Sets the maximum number of port-security traps sent per second. The range is from 0 to 1000; the default is 0 (no limit imposed; a trap is sent at every occurrence). |
The sending of port security SNMP traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to enable port-security traps at a rate of 200 per second:
Switch(config)# snmp-server enable traps port-security trap-rate 200
To enable the sending of Cisco IOS IP Service Level Agreements (SLAs) Simple Network Management Protocol (SNMP) trap notifications, use the snmp-server enable traps rtrcommand in global configuration mode. To disable IP SLAs SNMP notifications, use the noform of this command.
snmp-server enable traps rtr
no snmp-server enable traps rtr
This command has no arguments or keywords.
SNMP notifications are disabled by default.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 11.3 |
This command was introduced. |
Cisco IOS 12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Cisco IOS 12.2SX |
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
This command controls (enables or disables) Cisco IOS IP SLAs notifications, as defined in the Response Time Monitor MIB (CISCO-RTTMON-MIB).
The snmp-server enable traps rtrcommand is used in conjunction with the snmp-server hostcommand. Use the snmp-server host command to specify which host or hosts receive SNMP notifications. To send SNMP notifications, you must configure at least one snmp-server host command.
The following example shows how to enable the router to send IP SLAs SNMP traps to the host at the address myhost.cisco.com using the community string defined as public:
snmp-server enable traps rtr snmp-server host myhost.cisco.com informs version 2c public rtr
Command |
Description |
---|---|
ip sla monitor |
Begins configuration for an IP SLAs operation and enters IP SLA monitor configuration mode. |
ip sla |
Begins configuration for an IP SLAs operation and enters IP SLA configuration mode. |
snmp-server host |
Specifies the destination NMS and transfer parameters for SNMP notifications. |
snmp-server trap-source |
Specifies the interface that an SNMP trap should originate from. |
To enable SNMP traps, use the snmp-server enable traps snmp command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps snmp [ authentication ] [ coldstart ] [ linkdown ] [ linkup ] [ warmstart]
no snmp-server enable traps snmp [ authentication ] [ coldstart ] [ linkdown ] [ linkup ] [ warmstart]
authentication |
(Optional) Enables authentication traps. |
coldstart |
(Optional) Enables cold start traps. |
linkdown |
(Optional) Enables linkdown traps. |
linkup |
(Optional) Enables linkup traps. |
warmstart |
(Optional) Enables warmstart traps. |
The sending of SNMP traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to enable a warmstart SNMP trap:
Switch(config)# snmp-server enable traps snmp warmstart
To enable SNMP storm-control trap parameters, use the snmp-server enable traps storm-control command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps storm-control { trap-rate number-of-minutes}
no snmp-server enable traps storm-control { trap-rate}
trap-rate number-of-minutes |
(Optional) Specifies the SNMP storm-control trap rate in minutes. Accepted values are from 0 to 1000. |
The sending of SNMP storm-control trap parameters is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to set the SNMP storm-control trap rate to 10 traps per minute:
Switch(config)# snmp-server enable traps storm-control trap-rate 10
To enable SNMP STPX MIB traps, use the snmp-server enable traps stpx command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps stpx [ inconsistency][ loop-inconsistency][ root-inconsistency]
no snmp-server enable traps stpx [ inconsistency][ loop-inconsistency][ root-inconsistency]
inconsistency |
(Optional) Enables SNMP STPX MIB inconsistency update traps. |
loop-inconsistency |
(Optional) Enables SNMP STPX MIB loop inconsistency update traps. |
root-inconsistency |
(Optional) Enables SNMP STPX MIB root inconsistency update traps. |
The sending of SNMP STPX MIB traps is disabled.
Global configuration
Release |
Modification |
---|---|
Cisco IOS 15.0(2)EX |
This command was introduced. |
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command. If no trap types are specified, all trap types are sent.
Note | Informs are not supported in SNMPv1. |
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for each trap type.
This example shows how to generate SNMP STPX MIB inconsistency update traps:
Switch(config)# snmp-server enable traps stpx inconsistency