Specifications

1-4
Catalyst 6500 Series Switch and Cisco 7600 Series Router Network Analysis Module Installation and Configuration Note
78-16413-01
Chapter 1 Overview
Understanding How the NAM Uses SPAN
A switched port analyzer (SPAN) session is an association of a destination port with a set of source ports,
configured with parameters that specify the monitored network traffic. You can configure multiple SPAN
sessions in a switched network.
The WS-SVC-NAM-1 platform provides a single destination port for SPAN sessions. The
WS-SVC-NAM-2 platform provides two possible destination ports for SPAN and VACL sessions.
Multiple SPAN sessions to the NAM are supported, but they must be destined for different ports. The
NAM destination ports for use by the SPAN graphical user interface (GUI) are named DATA PORT 1
and DATA PORT 2 by default. In the CLI, SPAN ports are named as shown in Table 1-2.
Each of these ports is independent. You may create data-port collections that are populated by only the
traffic from one of the ports or collections that can be populated by traffic from both ports. You can still
create VLAN-based collections with packets from either port that match the specified VLAN populating
such collections.
For more information about SPAN and how to configure it on the Catalyst 6000 and 6500 series switches,
use this URL:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sy/swcg/span.htm#1032978
For more information about SPAN and how to configure it on the Cisco 7600 series router, use this URL:
http://www.cisco.com/univercd/cc/td/doc/product/core/cis7600/software/122sx/swcg/span.htm
Understanding How the NAM Uses VACLs
A VLAN access contrl list (VACL) can forward traffic from either a WAN interface or VLANs to a data
port on the NAM. VACLs provide an alternative to using SPAN. VACLs can provide access control based
on Layer 3 addresses for IP and IPX protocols. Unsupported protocols are access controlled through
MAC addresses. MAC VACLs cannot be used to access control IP or IPX addresses.
There are two types of VACLs, one which captures all bridged or routed VLAN packets and another
which captures a selected subset of all bridged or routed VLAN packets. Catalyst operating system
VACLs can only be used to capture VLAN packets because they are initially routed or bridged into the
VLAN on the switch.
VACLs can provide access control for all packets that are bridged within a VLAN or that are routed into
or out of a VLAN or, with Release 12.1(13)E or later releases, a WAN interface. Unlike regular Cisco
IOS standard or extended ACLs that are configured on router interfaces only and are applied on routed
packets only, VACLs apply to all packets and can be applied to any VLAN or WAN interface. VACLs
are processed in the hardware.
VACLs use Cisco IOS access control lists (ACLs). VACLs ignore any Cisco IOS ACL fields that are not
supported in the hardware. Standard and extended Cisco IOS ACLs are used to classify packets.
Classified packets can be subject to a number of features such as access control (security), encryption,
and policy-based routing. Standard and extended Cisco IOS ACLs are only configured on router
interfaces and applied on routed packets.
Ta b l e 1 - 2 S PA N P o r t N a m e s
Module Cisco IOS Catalyst Operating System
NAM-1 data-port 1 module number:3
NAM-2 data-port 1 and data-port 2 module number:7 or module number:8