Now, keep in mind we are a Hosting Provider. as such, i need to monitor traffic in this switch as its our core switch.
To this end i have a dedicated PRTG server monitoring the entire infrastructure, among them distribution switches, PDU's, core servers, etc.
I am not new to SNMP but no matter what i try, i cant poll the interfaces traffic via SNMP.
I can poll information such as the uptime, CPU load, overall system health, but not the traffic on each port, or ether-channel, etc.
After testing for 5 hours with different configuration options, i erased all the test config as far as SNMP goes, and only added the following line:
BORDER1#show run | inc snmp-server snmp-server community <string> RO BORDER1#
This string is the same i have in the PRTG configuration. When i put an invalid string, the PRTG server tells me immediately that the password is wrong. But when i put in the valid community string, the PRTG remains truing to load the ports for literally 10 hours and nothing happens.
With other switches it only takes a few seconds and i can monitor every port with no problem. Not with the 6509-E though.
So, with that being said, i figured maybe one of you guys out there has run into an issue like this before and found the way to solve it.
how do we restrict a router interfaces from directly connected to Some vlans? can any one help me to figureout?the question is Router should not have interfaces directly connected to Vlan 30 and Vlan 40
I've got a one problem. Me and my friend have the same ISP. I checked my External IP address at WhatIsMyIp.com and my friend do it to. And we saw we have the same External IP.So my question is can 2 routers have the same External IP address?If i'm right 2...
LISP Protocol (Location Identifier Separation Protocol)! - The LISP protocol has become a brilliant stardom with the digital transformation that we are now experiencing. - Today we will talk about the LISP protocol and its advantages and method of p...
SD-Access provides automated end-to-end services (such as segmentation, quality of service, and analytics) for user, device, and application traffic. SD-Access automates user policy so organizations can ensure the appropriate access control and applicati...
Purpose: This document shows you how to create a group-based security policy in Cisco DNA Center.
Security policies determine the types of network traffic permitted or denied between scalable groups. Scalable groups are a critical compo...