{"id":12616,"date":"2021-07-19T02:58:13","date_gmt":"2021-07-19T02:58:13","guid":{"rendered":"https:\/\/ded9.com\/?p=12616"},"modified":"2025-12-17T09:22:29","modified_gmt":"2025-12-17T09:22:29","slug":"ccna-training-introducing-span","status":"publish","type":"post","link":"https:\/\/ded9.com\/de\/ccna-training-introducing-span\/","title":{"rendered":"CCNA Training: Introducing SPAN (Switched Port Analyzer) for Network Monitoring"},"content":{"rendered":"<p><span style=\"font-size: 12pt;\">SPAN (Remote Switched Port Analyzer) or RSPAN May Be Used Under Different Names in Other Brands, such as 3COM Switches, where it is known as Roving Analysis Port (RAP).<\/span><\/p>\n<p>SPAN: To briefly introduce the Port Mirroring technique, it sends a copy of network traffic, including an entire LAN, to one or more devices and ports to monitor the network accurately.<\/p>\n<p>Of course, this method does not require you to worry about your information security because, by activating it, you only receive the Metadata package you need for the monitoring software to retrieve and display the desired information.<\/p>\n<p>Using the Port Mirroring technique, you can detect security vulnerabilities, network issues, and other problems. You can also mirror all inbound traffic (ingress) and outbound traffic (egress) on a single port, or all interfaces and VLANs of a switch, for monitoring. This is usually used more commonly for incoming network traffic.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-12618 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/cisco-span-diagram.png\" alt=\"Using the Port Mirroring technique, you can detect security vulnerabilities, network issues, and other problems. You can also mirror all inbound traffic (ingress) and outbound traffic (egress) on a single port, or all interfaces and VLANs of a switch, for monitoring. This is usually used more commonly for incoming network traffic.\" width=\"265\" height=\"222\" \/><\/p>\n<h2>What is SPAN?<\/h2>\n<p>Property (Switch Port Analyzer (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Span\" target=\"_blank\" rel=\"noopener\">SPAN<\/a>, sometimes called Port Monitoring) and Port Mirroring also call for analyzing network traffic utilizing analyzers. Tools: Network analyzers can provide a Cisco (Cisco Switchprobe) probe, a Remote Monitoring Probe tool, or software. The most straightforward network analysis software is Wireshark or Microsoft Network Monitor, which is called Sniffer network probe tools.<\/p>\n<p><strong>What is SPAN,<\/strong>\u00a0and\u00a0<strong>why do we need it?<br \/>\n<\/strong>The SPAN property is generated for the switches, as there is a fundamental difference in performance between the switch and the hub.<\/p>\n<p>There is no need for SPAN in the hub. If the data packet reaches one of the hub ports, that packet is copied and sent to all ports except the primary port.<\/p>\n<p>However, after turning it on in the switch, the layer two tables are created from the MAC Address or physical source address (Source MAC Address) of the sent packets. After <strong>making<\/strong>\u00a0this table, the\u00a0<strong>switch sends the packets directly to the destination port based on this table.<\/strong><\/p>\n<p>The following figure shows how a hub transfers a packet from source to destination.<\/p>\n<p>As it turns out, the hub copies or sends the input packet to one port over the other ports, so you can easily eavesdrop on the entire network traffic by setting a sniffer.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-12619 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/port-mirroring-lab-setup.png\" alt=\"As it turns out, the hub copies or sends the input packet to one port over the other ports, so you can easily eavesdrop on the entire network traffic by setting a sniffer.\" width=\"402\" height=\"275\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/port-mirroring-lab-setup.png 402w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/port-mirroring-lab-setup-300x205.png 300w\" sizes=\"(max-width: 402px) 100vw, 402px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 12pt;\">We ping PC1 from PC2 and confirm we can easily download the<\/span>\u00a0package.<\/p>\n<div id=\"attachment_2000\" class=\"wp-caption aligncenter\">\n<p><a href=\"https:\/\/ded9.com\/wp-content\/uploads\/2025\/02\/ping.png\"><img decoding=\"async\" class=\"loaded aligncenter wp-image-2000 size-full\" title=\"CCNA Tutorial: Introducing SPAN and Switched Port Analyzer Settings in Cisco for Network 18 Monitoring\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2025\/02\/ping.png\" alt=\"We ping PC1 from PC2 and confirm we can easily download the\u00a0package.\" width=\"456\" height=\"105\" aria-describedby=\"caption-attachment-2000\" data-lazy=\"true\" \/><\/a><\/p>\n<h3 id=\"caption-attachment-2000\" class=\"wp-caption-text\"><span style=\"font-size: 14pt;\">Ping<\/span><\/h3>\n<\/div>\n<div id=\"attachment_2001\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12620 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-capture.png\" alt=\"Ping\" width=\"989\" height=\"334\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-capture.png 989w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-capture-300x101.png 300w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-capture-768x259.png 768w\" sizes=\"(max-width: 989px) 100vw, 989px\" \/><\/p>\n<h3 id=\"caption-attachment-2001\" class=\"wp-caption-text\"><span style=\"font-size: 14pt;\">Wireshark capture<\/span><\/h3>\n<\/div>\n<p>However, as shown in the figure below, the switch understands computer two&#8217;s physical address and keeps it in its MAC table.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12622 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/switch-config.png\" alt=\"However, as shown in the figure below, the switch understands computer two's physical address and keeps it in its MAC table.\" width=\"394\" height=\"261\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/switch-config.png 394w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/switch-config-300x199.png 300w\" sizes=\"(max-width: 394px) 100vw, 394px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As soon as the data packet is sent from computer 1 to computer 2, the switch uses the MAC table to forward the packet directly to the port connected to computer 2. Therefore, sniffers and monitoring systems cannot access traffic within the network.<\/p>\n<p><span style=\"font-size: 12pt;\">This type of traffic sent to a specific destination is called\u00a0<strong>Unicast<\/strong>.<\/span><\/p>\n<div id=\"attachment_2002\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12623 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/ping-again.png\" alt=\"This type of traffic sent to a specific destination is called\u00a0Unicast.\" width=\"453\" height=\"106\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/ping-again.png 453w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/ping-again-300x70.png 300w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><\/p>\n<h3 id=\"caption-attachment-2002\" class=\"wp-caption-text\">Ping again<\/h3>\n<\/div>\n<div id=\"attachment_2004\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12624 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-arp-request.png\" alt=\"ping again\" width=\"986\" height=\"169\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-arp-request.png 986w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-arp-request-300x51.png 300w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/wireshark-arp-request-768x132.png 768w\" sizes=\"(max-width: 986px) 100vw, 986px\" \/><\/p>\n<h3 id=\"caption-attachment-2004\" class=\"wp-caption-text\"><span style=\"font-size: 14pt;\">Wireshark ARP request<\/span><\/h3>\n<\/div>\n<p>But in the example above, the following types of traffic can be received and analyzed by sniffer and monitoring systems:<\/p>\n<ul>\n<li>Broadcast traffic<\/li>\n<li>Multicast traffic<\/li>\n<li>Unknown monopoly traffic<\/li>\n<\/ul>\n<div id=\"attachment_2012\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12625 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/Regular-Switch.gif\" alt=\"Wireshark ARP request\" width=\"320\" height=\"310\" \/><\/p>\n<p id=\"caption-attachment-2012\" class=\"wp-caption-text\">Send traffic on the switch, usually.<\/p>\n<\/div>\n<div id=\"attachment_2013\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12626 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/Switch-with-Port-Mirroring.gif\" alt=\"Send traffic on the switch, usually.\" width=\"320\" height=\"310\" \/><\/p>\n<p id=\"caption-attachment-2013\" class=\"wp-caption-text\">Send traffic to the Port Mirroring activation time switch<\/p>\n<\/div>\n<p>As mentioned, the traffic switch only sends traffic to the destination you must send it to.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12627 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/port-mirror-monitoring-device.png\" alt=\"As mentioned, the traffic switch only sends traffic to the destination you must send it to.\" width=\"265\" height=\"221\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>An additional feature is needed in the switch to access Unicast packages: the SPAN property. As shown below, with this feature, the traffic between the two ports in the stream can be copied to another port, called SPAN, to be used by Sniffer and the monitoring system.<\/p>\n<div id=\"attachment_2006\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12628 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/cisco-span-diagram-1.png\" alt=\"An additional feature is needed in the switch to access Unicast packages: the SPAN property. As shown below, with this feature, the traffic between the two ports in the stream can be copied to another port, called SPAN, to be used by Sniffer and the monitoring system.\" width=\"265\" height=\"222\" \/><\/p>\n<h2 id=\"caption-attachment-2006\" class=\"wp-caption-text\"><span style=\"font-size: 18pt;\">Switched Port Analyzer (SPAN)<\/span><\/h2>\n<\/div>\n<p>0The capabilities of defining a destination in the SPAN technique have greatly improved since the day this technique was introduced.\u00a0<strong>When we talk about SPAN, <\/strong>the\u00a0<strong>source and destination addresses<\/strong>\u00a0are\u00a0<strong>on the same switch<\/strong>\u00a0to which we are currently connected.<\/p>\n<div id=\"attachment_2008\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12629 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137761-SPAN1.jpg\" alt=\"0The capabilities of defining a destination in the SPAN technique have greatly improved since the day this technique was introduced.\u00a0When we talk about SPAN, the\u00a0source and destination addresses\u00a0are\u00a0on the same switch\u00a0to which we are currently connected.\" width=\"635\" height=\"241\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137761-SPAN1.jpg 635w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137761-SPAN1-300x114.jpg 300w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><\/p>\n<h2 id=\"caption-attachment-2008\" class=\"wp-caption-text\"><span style=\"font-size: 18pt;\">Local SPAN<\/span><\/h2>\n<\/div>\n<p>The rules for RSPAN Source are similar to those for SPAN Source, meaning that the source must have at least one physical port or a VLAN on the switch.<br \/>\n<strong>The main difference between RSPAN and SPAN is the destination, which in RSPAN no longer requires a port on the same switch but can be defined on another switch.\u00a0<\/strong><\/p>\n<p>In such a case, we create a dedicated VLAN called\u00a0<strong>RSPAN\u00a0VLAN<\/strong> to implement RSPAN; this VLAN includes the ports defined in the source switch and the destination switch. As you can see in the image below, the traffic sent from the RSPAN VLAN as a trunk will be visible at the destination.<\/p>\n<div id=\"attachment_2009\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12630 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137783-SPAN2.png\" alt=\"In such a case, we create a dedicated VLAN called\u00a0RSPAN\u00a0VLAN to implement RSPAN; this VLAN includes the ports defined in the source switch and the destination switch. As you can see in the image below, the traffic sent from the RSPAN VLAN as a trunk will be visible at the destination.\" width=\"635\" height=\"245\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137783-SPAN2.png 635w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137783-SPAN2-300x116.png 300w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><\/p>\n<h2 id=\"caption-attachment-2009\" class=\"wp-caption-text\"><span style=\"font-size: 18pt;\">Remote SPAN &#8211; RSPAN<\/span><\/h2>\n<\/div>\n<p>Finally,\u00a0<strong>if our traffic is to pass through several different routers and network infrastructures, we use another technique called Encapsulated Remote SPAN or ERSPAN.<\/strong><\/p>\n<p>The source defined in SPAN consists of at least one physical port or VLAN on the same switch that we want to monitor. The destination port must also be on the same switch. Once configured, SPAN Source traffic is sent to the SPAN Destination Port.<\/p>\n<div id=\"attachment_2010\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12631 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137784-SPAN3.jpg\" alt=\"The source defined in SPAN consists of at least one physical port or VLAN on the same switch that we want to monitor. The destination port must also be on the same switch. Once configured, SPAN Source traffic is sent to the SPAN Destination Port.\" width=\"632\" height=\"290\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137784-SPAN3.jpg 632w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/137784-SPAN3-300x138.jpg 300w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/p>\n<p id=\"caption-attachment-2010\" class=\"wp-caption-text\">Encapsulated Remote SPAN or ERSPAN<\/p>\n<\/div>\n<h2><span style=\"font-size: 18pt;\">SPAN startup requirements<\/span><\/h2>\n<p>SPAN, RSPAN, and ERSPAN all have a series of technical conditions and requirements to be able to monitor and send traffic properly:<\/p>\n<ol>\n<li>SPAN Source can be a physical port or a VLAN; the two can not be combined.<\/li>\n<li>A-SPAN Source Port cannot be a Destination Port simultaneously, and vice versa.<\/li>\n<li>Whether SPAN, RSPAN, or ERSPAN, each session can mirror traffic to only one destination, and sharing on destination ports is meaningless.<\/li>\n<li>When Trunk ports are defined as Sources in SPAN, all traffic in VLANs is monitored by default. If you want to monitor only specific traffic, you must filter your desired VLAN.<\/li>\n<\/ol>\n<h2><span style=\"font-size: 14pt;\">Catalyst Switches that support SPAN, RSPAN, and ERSPAN:<\/span><\/h2>\n<table width=\"568\">\n<tbody>\n<tr>\n<td dir=\"ltr\" width=\"64\"><strong>SPAN Support<\/strong><\/td>\n<td width=\"64\"><strong>RSPAN Support<\/strong><\/td>\n<td width=\"376\"><strong>ERSPAN Support<\/strong><\/td>\n<td width=\"64\"><strong>Catalyst Switches<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst Express 500\/520 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">Supervisor 2T with PFC4, Supervisor 720 with PFC3B or PFC3BXL running Cisco IOS Software Release 12.2 (18) SXE or later. Supervisor 720 with PFC3A that has hardware version 3.2 or later and running Cisco IOS Software Release 12.2 (18) SXE or later<\/td>\n<td width=\"64\">Catalyst 6500\/6000 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 5500\/5000 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 4900 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 4500\/4000 Series (includes 4912G)<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 3750 Metro Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 3750 \/ 3750E \/ 3750X Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 3560 \/ 3560E \/ 3650X Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 3550 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 3500 XL Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2970 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2960 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2955 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2950 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2940 Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">No<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2948G-L3<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">Yes<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2948G-L2, 2948G-GE-TX, 2980G-A<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 2900XL Series<\/td>\n<\/tr>\n<tr>\n<td width=\"64\">Yes<\/td>\n<td width=\"64\">No<\/td>\n<td width=\"376\">No<\/td>\n<td width=\"64\">Catalyst 1900 Series<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span style=\"font-size: 18pt;\">Implementing SPAN at Cisco<\/span><\/h2>\n<p>Consider the following network: PC2, PC3, and PC4. It is a good idea to send a copy to PC5 for any traffic they send and receive. S, we have to introduce the GIG 0\/3 interface as SPAN.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-12632 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/SPAN.png\" alt=\"Consider the following network: PC2, PC3, and PC4. It is a good idea to send a copy to PC5 for any traffic they send and receive. S, we have to introduce the GIG 0\/3 interface as SPAN.\" width=\"759\" height=\"517\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/SPAN.png 759w, https:\/\/ded9.com\/wp-content\/uploads\/2021\/07\/SPAN-300x204.png 300w\" sizes=\"(max-width: 759px) 100vw, 759px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-size: 18pt;\">Specify the following command to specify sources:<\/span><\/h2>\n<p dir=\"ltr\">Switch (config) #\u00a0<strong>monitor session 1 source interface fastEthernet0 \/ 0 &#8211; 2 bath<\/strong><\/p>\n<blockquote><p>Note: To send traffic send and receive both, and for traffic send tx and traffic receive rx, if we do not enter anything, both will be activated automatically.<\/p><\/blockquote>\n<p>And now, to send a copy of the traffic to PC5, we enter the following command:<\/p>\n<p dir=\"ltr\">Switch (config) #\u00a0<strong>monitor session 1 destination interface gigabitethernet0 \/ 3<\/strong><\/p>\n<h2 dir=\"ltr\">FAQ<\/h2>\n<div id=\"rank-math-rich-snippet-wrapper\"><div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-1\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What is SPAN in Cisco networking?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>SPAN (Switched Port Analyzer) copies traffic from one or more source ports or VLANs to a destination port for monitoring and analysis.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-2\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Why is SPAN used in network monitoring?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>SPAN allows administrators to capture and analyze network traffic that would otherwise be switched directly to its destination, enabling troubleshooting and security analysis.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-3\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What is the difference between SPAN and RSPAN?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>SPAN mirrors traffic on the same switch, while RSPAN can send mirrored traffic across switches using a dedicated VLAN.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SPAN (Remote Switched Port Analyzer) or RSPAN May Be Used Under Different Names in Other Brands, such as 3COM Switches, where it is known as Roving Analysis Port (RAP). SPAN: To briefly introduce the Port Mirroring technique, it sends a copy of network traffic, including an entire LAN, to one or more devices and ports [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[96],"tags":[4398],"class_list":["post-12616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network","tag-mac-address"],"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/12616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/comments?post=12616"}],"version-history":[{"count":7,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/12616\/revisions"}],"predecessor-version":[{"id":266226,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/12616\/revisions\/266226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media\/12617"}],"wp:attachment":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media?parent=12616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/categories?post=12616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/tags?post=12616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}