RE: NBAR protocol discovery

From: Huan Pham (Huan.Pham@peopletelecom.com.au)
Date: Tue Dec 16 2008 - 21:07:38 ARST


Hi Haroon,

I do not think that you can see the source IP with show ip NBAR.

However, you can use ACL with log enabled, or policy-map with ACL and
log enabled to catch the source IP. Alternatively, SPAN feature with
sniffer are designed for just this :-))

Cheers,

Huan

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Haroon
Sent: Wednesday, 17 December 2008 9:52 AM
To: Cisco certification
Subject: NBAR protocol discovery

Hello Experts,

When showing output for "*show ip nbar protocol-discovery*" command
(shown below), is it possible to see which IP Address / Node on the
network is generating *exchange *traffic?

RATL-CoreRT#show ip nbar protocol-discovery

FastEthernet0/0
                            Input Output
                            ----- ------
   Protocol Packet Count Packet Count
                            Byte Count Byte Count
                            5min Bit Rate (bps) 5min Bit Rate (bps)
                            5min Max Bit Rate (bps) 5min Max Bit Rate
(bps)
   ------------------------ ------------------------
------------------------
   http 283156 116313
                            76126042 116689357
                            10000 0
                            180000 1187000
   *exchange *560608 526
                            181206455 48777
                            1000 0
                            401000 0

thank you,

haroon

Blogs and organic groups at http://www.ccie.net



This archive was generated by hypermail 2.1.4 : Thu Jan 01 2009 - 12:53:08 ARST