From: Huan Pham (Huan.Pham@peopletelecom.com.au)
Date: Tue Dec 16 2008 - 21:07:38 ARST
Hi Haroon,
I do not think that you can see the source IP with show ip NBAR.
However, you can use ACL with log enabled, or policy-map with ACL and
log enabled to catch the source IP. Alternatively, SPAN feature with
sniffer are designed for just this :-))
Cheers,
Huan
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Haroon
Sent: Wednesday, 17 December 2008 9:52 AM
To: Cisco certification
Subject: NBAR protocol discovery
Hello Experts,
When showing output for "*show ip nbar protocol-discovery*" command
(shown below), is it possible to see which IP Address / Node on the
network is generating *exchange *traffic?
RATL-CoreRT#show ip nbar protocol-discovery
FastEthernet0/0
Input Output
----- ------
Protocol Packet Count Packet Count
Byte Count Byte Count
5min Bit Rate (bps) 5min Bit Rate (bps)
5min Max Bit Rate (bps) 5min Max Bit Rate
(bps)
------------------------ ------------------------
------------------------
http 283156 116313
76126042 116689357
10000 0
180000 1187000
*exchange *560608 526
181206455 48777
1000 0
401000 0
thank you,
haroon
Blogs and organic groups at http://www.ccie.net
This archive was generated by hypermail 2.1.4 : Thu Jan 01 2009 - 12:53:08 ARST