This document provides a sample configuration for the use of the VLAN
ACL (VACL) Capture Port feature for network traffic analysis in a more granular
manner. This document also states the advantage of VACL capture-port usage as
opposed to VLAN-based SPAN (VSPAN) usage.
In order to configure the VACL capture-port feature on Cisco Catalyst
6000/6500 that runs Catalyst OS software, refer to
Capture for Granular Traffic Analysis with Cisco Catalyst 6000/6500 Running
Ensure that you meet these requirements before you attempt this
The information in this document is based on these software and
hardware versions: Cisco Catalyst 6506 Series Switch that runs Cisco
IOS® Software Release 12.2(18)SXF8.
The information in this document was created from the devices in a
specific lab environment. All of the devices used in this document started with
a cleared (default) configuration. If your network is live, make sure that you
understand the potential impact of any command.
This configuration can also be used with Cisco Catalyst 6000 / 6500
Series Switches that run Cisco IOS Software Release 12.1(13)E and later.
Technical Tips Conventions for more information on document
SPAN (Switched Port ANalyzer) copies traffic from one or more source
ports in any VLAN or from one or more VLANs to a destination port for analysis.
Local SPAN supports source ports, source VLANs, and destination ports on the
same Catalyst 6500 Series Switch.
A source VLAN is a VLAN monitored for network traffic analysis.
VLAN-based SPAN (VSPAN) uses a VLAN as the SPAN source. All the ports in the
source VLANs become source ports. A source port is a port monitored for network
traffic analysis. Trunk ports can be configured as source ports and mixed with
nontrunk source ports, but SPAN does not copy the encapsulation from a source
For VSPAN sessions with both ingress and egress configured, two packets
are forwarded from the destination port if the packets get switched on the same
VLAN (one as ingress traffic from the ingress port and one as egress traffic
from the egress port).
VSPAN only monitors traffic that leaves or enters Layer 2 ports in the
If you configure a VLAN as an ingress source and traffic gets routed
into the monitored VLAN, the routed traffic is not monitored because it never
appears as ingress traffic that enters a Layer 2 port in the VLAN.
If you configure a VLAN as an egress source and traffic gets routed
out of the monitored VLAN, the routed traffic is not monitored because it never
appears as egress traffic that leaves a Layer 2 port in the
For more information on source VLANs, refer to
of Source VLAN.
VACLs can provide access control for all packets that are bridged
within a VLAN or that are routed into or out of a VLAN or a WAN interface for
VACL capture. Unlike regular Cisco IOS standard or extended ACLs that are
configured on router interfaces only and are applied on routed packets only,
VACLs apply to all packets and can be applied to any VLAN or WAN interface.
VACLs are processed in hardware. VACLs use Cisco IOS ACLs. VACLs ignore any
Cisco IOS ACL fields that are not supported in hardware.
You can configure VACLs for IP, IPX, and MAC-Layer traffic. VACLs
applied to WAN interfaces support only IP traffic for VACL capture.
When you configure a VACL and apply it to a VLAN, all packets that
enter the VLAN are checked against this VACL. If you apply a VACL to the VLAN
and an ACL to a routed interface in the VLAN, a packet that comes into the VLAN
is first checked against the VACL and, if permitted, is then checked against
the input ACL before it is handled by the routed interface. When the packet is
routed to another VLAN, it is first checked against the output ACL that is
applied to the routed interface, and, if permitted, the VACL configured for the
destination VLAN is applied. If a VACL is configured for a packet type and a
packet of that type does not match the VACL, the default action is deny. These
are the guidelines for the capture option in VACL.
The capture port cannot be an ATM port.
The capture port needs to be in the spanning-tree forwarding state
for the VLAN.
The switch has no restriction on the number of capture
The capture port captures only packets permitted by the configured
Capture ports only transmit traffic that belongs to the capture port
VLAN. Configure the capture port as a trunk that carries the required VLANs in
order to capture traffic that goes to many
Caution: Incorrect combination of ACLs can disrupt the traffic flow. Exercise
extra caution while you configure the ACLs in your device.
Note: VACL is not supported with IPv6 on a Catalyst 6000 series switch. In
other words, VLAN ACL redirect and IPv6 are not compatible so ACL cannot be
used to match IPv6 traffic.
There are several limitations of VSPAN usage for traffic
All layer 2 traffic that flows in a VLAN is captured. This increases
the amount of data to be analyzed.
The number of SPAN sessions that can be configured on the Catalyst
6500 Series Switches is limited. Refer to
SPAN and RSPAN Session Limits for more information.
A destination port receives copies of sent and received traffic for
all monitored source ports. If a destination port is oversubscribed, it can
become congested. This congestion can affect traffic forwarding on one or more
of the source ports.
The VACL Capture Port feature can help to overcome some of these
limitations. VACLs are primarily not designed to monitor traffic, but, with a
wide range of capability to classify the traffic, the Capture Port feature was
introduced so that network traffic analysis can become much simpler. These are
the advantages of VACL Capture Port usage over VSPAN:
Granular Traffic Analysis
VACLs can match based on source IP address, destination IP address,
Layer 4 protocol type, source and destination Layer 4 ports, and other
information. This capability makes VACLs very useful for granular traffic
identification and filtering.
Number of Sessions
VACLs are enforced in hardware; the number of Access Control Entries
(ACE) that can be created depends upon the TCAM available in the
Destination Port Oversubscription
Granular traffic identification reduces the number of frames to be
forwarded to the destination port and thereby minimizes the probability of
VACLs are enforced in hardware; there is no performance penalty for
the application of VACLs to a VLAN on the Cisco Catalyst 6500 Series
In this section, you are presented with the information to configure
the features described in this document.
Note: Use the
Command Lookup Tool
(registered customers only)
to find more information on the
commands used in this document.
This document uses this network setup:
This configuration example lists the steps required to capture all
Layer 2 traffic that flows in VLAN 100 and VLAN 200 and send them to the
Network Analyzer device.
Specify the interesting traffic. In our example, it is traffic that
flows in VLAN 100 and VLAN 200.
Cat6K-IOS(config)#monitor session 50 source vlan 100 , 200 ?
, Specify another range of VLANs
- Specify a range of VLANs
both Monitor received and transmitted traffic
rx Monitor received traffic only
tx Monitor transmitted traffic only
!--- Default is to monitor both received and transmitted traffic
Cat6K-IOS(config)#monitor session 50 source vlan 100 , 200
Specify the destination port for the captured traffic.
Cat6K-IOS(config)#monitor session 50 destination interface Fa3/30
With this, all the layer 2 traffic that belongs to VLAN 100 and VLAN
200 is copied and sent to port Fa3/30. If the destination port is part of the
same VLAN whose traffic is monitored, the traffic that goes out of the
destination port is not captured.
Verify your SPAN configuration with the show
Cat6K-IOS#show monitor detail
Type : Local Session
Source Ports :
RX Only : None
TX Only : None
Both : None
Source VLANs :
RX Only : None
TX Only : None
Both : 100,200
Source RSPAN VLAN : None
Destination Ports : Fa3/30
Filter VLANs : None
Dest RSPAN VLAN : None
In this configuration example, there are multiple requirements from the
HTTP Traffic from a range of hosts (10.20.20.128/25) in VLAN 200 to a
specific server (10.10.10.101) in VLAN 100 needs to be
Multicast User Datagram Protocol (UDP) traffic in the transmit
direction destined for group address 188.8.131.52 needs to be captured from VLAN
Define the interesting traffic to be caputured and sent to
Cat6K-IOS(config)#ip access-list extended HTTP_UDP_TRAFFIC
Cat6K-IOS(config-ext-nacl)#permit tcp 10.20.20.128 0.0.0.127 host 10.10.10.101 eq www
Cat6K-IOS(config-ext-nacl)#permit udp any host 184.108.40.206
Define an umberlla ACL to map all other traffic.
Cat6K-IOS(config)#ip access-list extended ALL_TRAFFIC
Cat6K-IOS(config-ext-nacl)#permit ip any any
Define the VLAN access map.
Cat6K-IOS(config)#vlan access-map HTTP_UDP_MAP 10
Cat6K-IOS(config-access-map)#match ip address HTTP_UDP_TRAFFIC
Cat6K-IOS(config-access-map)#action forward capture
Cat6K-IOS(config)#vlan access-map HTTP_UDP_MAP 20
Cat6K-IOS(config-access-map)#match ip address ALL_TRAFFIC
Apply the VLAN access map to the appropriate VLANs.
Cat6K-IOS(config)#vlan filter HTTP_UDP_MAP vlan-list 100
!--- Here 100 is the ID of VLAN on which the VACL is applied.
Configure the Capture Port.
Cat6K-IOS(config-if)#switchport capture allowed vlan ?
WORD VLAN IDs of the allowed VLANs when this po
add add VLANs to the current list
all all VLANs
except all VLANs except the following
remove remove VLANs from the current list
Cat6K-IOS(config-if)#switchport capture allowed vlan 100
Use this section to confirm that your configuration works
Output Interpreter Tool
(registered customers only)
(OIT) supports certain
show commands. Use the OIT to view an analysis of
show command output.
There is currently no specific troubleshooting information available
for this configuration.