11-08-2023 01:58 AM
hi all,
i checkout 3 options for traffic policy
Traffic Copy Policies - Traffic Copy Destination - Traffic Copy Contract
i found it is usual for monitoring traffic for security check
i need more info for them and what is real cases in our environment that we can use this options ?
Solved! Go to Solution.
11-09-2023 03:37 AM
No problem @Ahmed Tarek.
The traffic copy destination must be an interface of a Cisco router in your inventory(ASR4k, Cat 8k, ISR1k). So you would configure the destination to be an interface on your a router that you can connect to anything you want, including a VM running Wireshark or similar packet/traffic analysis tools.
11-08-2023 03:22 AM - edited 11-08-2023 04:03 AM
Traffic copy is actually just ERSPAN. Policies, Destinations and contracts are different parts of traffic-copy configuration, not 3 separate ways to achieve traffic copy. You would use Traffic copy in the same scenarios as you would any other SPAN, usually troubleshooting or copying traffic for IDS/traffic analysis/packet capture.
A Traffic Copy Policy defines which traffic flows you are interested in(source tag, destination tag), and can be associated with a traffic copy contract. A traffic copy contract is mapped to a traffic copy destination, such that when you choose a traffic-contract for your policy you choose which destination to use.
To configure traffic copy you would use the following procedure:
You can read more about this here: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/2-3-3/user_guide/b_cisco_dna_center_ug_2_3_3/m_configure-traffic-copy-policies.html#id_52079
11-08-2023 04:59 AM
thanks @Torbjørn for your reply,
i think i got the point for usage for this feature, but sorry what is the point in real environment, for me i did not need it for now as there is a there solution i already used like Cisco stealwatch or firewall
11-08-2023 06:20 AM
Traffic Copy differs quite a bit from stealthwatch and firewalls. It copies all packets that are matched by the policy and sends them to a device for analysis.
Traffic copy allows you to inspect the packets that are forwarded through your network. If you are having an issue with an application you can have the traffic forwarded to your machine to inspect the packets. If your network is undergoing an security audit you can have traffic forwarded to an appliance for packet capture/analysis. If you wish to run an IDS within your campus network this feature will allow you to send your IDS applianc the traffic you wish to. These are the most common real-life production uses for traffic copy/ERSPAN.
11-09-2023 02:53 AM - edited 11-09-2023 03:15 AM
thanks @Torbjørn for your reply and help,
my last question , can i set a VM with third party program ( as destination) like wireshark to deep inspection packet ? or other similar program ?
i mean
src ip is switch port ( trunk )
destination is port connected to VM with wireshark to deep inspection packet
11-09-2023 03:37 AM
No problem @Ahmed Tarek.
The traffic copy destination must be an interface of a Cisco router in your inventory(ASR4k, Cat 8k, ISR1k). So you would configure the destination to be an interface on your a router that you can connect to anything you want, including a VM running Wireshark or similar packet/traffic analysis tools.
11-09-2023 05:22 AM
thanks my friend,
really appreciated!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide