Choosing Tap or SPAN for Data Center Monitoring

Similar documents
Tool Optimization. Benefits. Introduction. Technical Brief. Extend the usage life of tools and avoid costly upgrades

Multi Stage Filtering

Network Instruments white paper

Analyzing Full-Duplex Networks

How To Monitor A Network With A Network Probe

How To Use A Network Instrument Ntap

Technical Bulletin. Enabling Arista Advanced Monitoring. Overview

Any-to-any switching with aggregation and filtering reduces monitoring costs

Secure Access Complete Visibility

Taps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks

SPAN Port or TAP? TAP is the only viable data access technology for today s business critical networks

Monitoring Network Traffic Using SPAN

Observer Analysis Advantages

Optimized Network Monitoring

Cisco Integrators Cisco Partners installing and implementing the Cisco Catalyst 6500 Series Switches

Network Analysis Modules

Enhancing Cisco Networks with Gigamon // White Paper

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

Observer Probe Family

WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency

Network Considerations for IP Video

Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

Chapter 4: Spanning Tree Design Guidelines for Cisco NX-OS Software and Virtual PortChannels

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Table of Contents. Network Critical NA LLC Tel: Franklin Street, Suite

Network Management and Monitoring Software

How to Monitor a FabricPath Network

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Network Performance Channel

Question: 3 When using Application Intelligence, Server Time may be defined as.

Network Agent Quick Start

Infrastructure for active and passive measurements at 10Gbps and beyond

A-7: SPAN Out of the Box Wednesday June 16, :15 pm 2:45 pm

Carrier Ethernet: New Game Plan for Media Converters

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Intelligent Data Access Networking TM

Cisco NetFlow Generation Appliance (NGA) 3140

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Layer 3 Network + Dedicated Internet Connectivity

WHITE PAPER. Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

Whitepaper. A Guide to Ensuring Perfect VoIP Calls. blog.sevone.com info@sevone.com

White Paper: Validating 10G Network Performance

6/8/2011. Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction

FWSM introduction Intro 5/1

Monitoring Network Traffic Using SPAN

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable

Deploying Network Taps for improved security

Improving Quality of Service

Fail-Safe IPS Integration with Bypass Technology

UCS Network Utilization Monitoring: Configuration and Best Practice

This topic lists the key mechanisms use to implement QoS in an IP network.

Deploying Probes and Analyzers in an Enterprise Environment

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches

Best Practices in Gigabit Capture

FASTIRON II SWITCHES Foundry Networks award winning FastIron II family of switches provides high-density

Enhanced Visibility, Improved ROI

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Gaining Operational Efficiencies with the Enterasys S-Series

Ethernet Link SGI-4844F

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

AlliedWare Plus OS How To Use sflow in a Network

Configuring EtherChannels

Efficient Network Monitoring Access

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

SNMP Monitoring: One Critical Component to Network Management

What s New in VMware vsphere 5.5 Networking

Configuring DHCP Snooping

Auditing the LAN with Network Discovery

Net Optics xbalancer and McAfee Network Security Platform Integration

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Observer Probe Family

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions

Generic On-Line Diagnostics

Cisco Network Analysis Module Software 4.0

Cisco Nexus 7000 Series Supervisor Module

Firewalls P+S Linux Router & Firewall 2013

Integrating Telrex CallRex Call Recording Solution with the Cisco Unified Communications 500 Series for Small Business

Region 10 Videoconference Network (R10VN)

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Please purchase PDF Split-Merge on to remove this watermark.

A Summary of Network Traffic Monitoring and Analysis Techniques

Network Simulation Traffic, Paths and Impairment

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia

Troubleshooting LANs with Network Statistics Analysis

Configuring NetFlow-lite

The Advantages of Cloud Services

Cisco Bandwidth Quality Manager 3.1

Networking Topology For Your System

Transcription:

Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of failure. SPAN ports are configurable for specific data, can capture intra-switch traffic, and create no additional expense, but may drop packets randomly and will not transmit errored packets. Choose SPAN or tap resources based on your particular monitoring needs. A mix of SPAN and tap is often superior to using one or the other exclusively. In network and security monitoring, there s an ongoing debate about the best data access method to deliver copied network traffic to monitoring tools. The debate comes down to taps or port mirroring/span technology and there are good points for both methods. There is no objectively correct answer to this debate the best practice must be decided for each data source in each network. However, because of the different characteristics from these two different technologies, we should be able to come up with a general guideline to make a sensible decision based on different monitoring scenarios, requirements, capture locations or projects. The pro and con for taps versus SPANs works out to a few key points, summarized below. Taps Pro and Con Benefits of taps include: Taps are completely passive, purely optical splitters and do not need power or IP configuration. Taps are not addressable network devices and therefore cannot be hacked. TECHNICAL BRIEF

A B A B A B A B A B A B A B A B A B A B A B A B A B A B A B A B MODE SYSY RPS ST DPLX SPED Catalyst 2960-S Series SI CONSOLE Technical Brief Taps vs SPAN in Network Monitoring Switches SPAN Ports Pro and Con Ingress Traffic Switch SPAN Ports Egress Traffic APCON Chassis with 16 Passive Taps Benefits of SPAN ports include: No additional cost to create a SPAN port. SPAN ports are remotely configurable from any management station that can access the configuration of the switch. SPAN ports are capable of capturing intra-switch traffic. Challenges with SPAN ports include: RMON Analyzer Taps are failsafe, especially when placed in the aggregation layers where network redundancy is already established. Taps provide total visibility into full-duplex networks and eliminate the risk of dropped packets, regardless of the bandwidth. With taps, monitoring devices receive all packets, including packets with physical errors. Taps do not groom data in any way. This is particularly helpful in troubleshooting common physical layer problems, including bad frames that can be caused by a faulty NIC or cable. Taps do not alter the time relationships of frames. This time relationship is critical for certain latency sensitive measurements. Taps do not introduce any additional jitter or distortion, which is important in VoIP and Video signal analysis. Taps can monitor both sides of a full duplex link individually. Taps do not behave differently if the traffic is IPv4 or IPv6; they pass all traffic through unaltered. Challenges with taps include: Forensic Each analysis device may need to budget 2 capture interfaces to receive both sides of a tapped link. There is an additional cost for tap hardware. Taps create an additional potential point of failure. Taps create additional deployment complexity: Split ratio and light budget loss calculation. Disruption of the production network for tap insertion. IDS SPAN ports cannot handle heavily utilized full-duplex links without dropping packets. If the throughput of all TX and RX traffic is higher than the SPAN port line rate, frames are dropped randomly by the SPAN port. To completely capture bidirectional traffic from a 10G link, a SPAN port would need up to 20G of capacity. SPAN ports drop all packets that are corrupt or those that are over- or under-sized, thus hampering some physical layer analysis. SPAN ports place a burden on a switch's CPU and fabric channels to copy all data passing through ports. This potentially affects the performance of production traffic. For example, Centralized Replication in certain switches can reduce performance. Some SPAN ports require you to monitor these factors to avoid issues: SPAN Destination Switch Fabric Replication Engine Forwarding Engine SPAN ports can change the timing of frame interaction, altering measured response times. Switches prioritize SPAN port data lower than regular portto-port data. If replicating a frame becomes an issue, the hardware will temporally drop the SPAN process and therefore stop the data flow to the SPAN port. The more SPAN sessions that are configured, the easier it is to reach this threshold. RSPAN/ERSPAN ports put the monitoring traffic into the production network, which reduces the amount of throughput available for user traffic.

Technical Brief Taps vs SPAN in Network Monitoring Without special configuration details and settings, VLAN tags are not normally passed through any SPAN port. This can lead to false VLAN issues and difficulty in finding actual VLAN issues. Choosing SPAN or Tap Production Network Impact The integrity of traffic forwarded to the monitoring tools is critical to provide accurate monitoring and troubleshooting results. However, the greater concern is that the data access method chosen will affect the performance of the actual production network traffic. SPAN EXAMPLE: CISCO 6500 IOS RELEASE 12.2SX On this switch, SXF7 code configures Rx SPAN in Distributed Mode, but Tx SPAN is configured in Centralized Mode. In contrast, SXI3 configures both Tx and Rx SPAN in Distributed Mode. In Distributed Mode, the packets can be replicated between the source and destination modules/interfaces without supervisor intervention. In Centralized Replication Mode, packets go from the source module/interface to the replication engine on the supervisor and are replicated to the destination module/interface. All the replicated SPAN traffic must traverse the backplane fabric, increasing backplane fabric utilization. Data centers are advised to upgrade to SXI3 on systems where Tx SPAN is required. However, regardless of SXF or SXI, Distributed Mode is supported only on modules with a local replication engine (for example, DFC based modules). None of the classic line cards support Distributed Replication. In general, taps are totally passive, especially optical fiber taps. They do not generally impact production traffic at all. However, SPAN ports might have a potential impact on the production network traffic. There are 4 key pieces involved with SPAN: 1. SPAN destination port 2. Fabric Channel 3. Replication Engine 4. Forwarding Engine Any of the 4 pieces above may become oversubscribed depending on other traffic flowing through the system, the number of replication sessions configured, types of source and destination line cards, available buffer, forwarding engine capacity, and other factors. So it is important these four areas be well-understood to avoid any adverse effects to the production traffic. To avoid oversubscription issues, Cisco recommends using Cisco EEM (Embedded Event Manager). The Embedded Event Manager is made up of TCL scripts embedded in the IOS to run commands for Replication Engine monitoring. Additionally, Cisco recommends that users continuously monitor fabric utilization. If the SPAN source interface is a VLAN, users are advised to be cautious, as fabric utilization can easily rise. SPAN Oversubscription Point Monitoring Options To monitor your network using SPAN ports without risking oversubscription on the Cisco Nexus line of switches, consider the following options: 1. Platform SNMP MIB Supported as part of CISCO-SWITCH-ENGINE- MIB and CISCO-SWITCH-FABRIC-MIB in 5.2 2. XML API XML version of internal show commands to monitor oversubscription in 5.2 3. EEM/TCL Supported in 5.2 4. CLI Available in 4.2.x

Technical Brief Taps vs SPAN in Network Monitoring The following Cisco command sets may be used to monitor different points of oversubscription on switches running NX-OS: 1. Replication engine utilization Show hardware internal statistics device rewrite congestion asic-all i error 2. Forwarding engine throughput show hardware internal forwarding statistics L3 show hardware internal forwarding engine usage show hardware capacity forwarding EXAMPLE: CISCO NEXUS 5000 NX-OS 4.2.6 Oversubscribing the SPAN can impact production traffic. Consider the following: 1. Resource contention to the replication engine. For example, multicast packets that use the same replication engine used to replicate SPAN packets. 2. Resource contention to the forwarding engine (60 MPPS limit on M1). For example, more forwarding engine lookups for SPAN traffic. A Tx/Rx SPAN port requires 3 lookups in the forwarding engine compared to just one for non-span traffic. 3. Fabric Virtual Output Queuing oversubscription. Spanned traffic drop at the destination is of minimal concern. The impact to the production traffic and system resources is the main concern. Cisco recommends against implementing continuous SPAN until you are able to monitor the adverse impacts, arrange notification, and be ready to respond to those notifications. Unfortunately, such monitoring can be accomplished only through the Cisco command line interface unless users upgrade their software to NX-OS version 5.2, followed by design and test of a solution for monitoring SPAN oversubscription with XML API or using EEM/TCL scripting. 3. Fabric VQI utilization show hardware fabric-utilization detail To summarize the potential impact of the continuous SPAN setup, users are advised to monitor the switch internal resource utilization after creating the SPAN. If the utilization threshold is exceeded, users are advised to turn off the SPAN to prevent any adverse impact to the production network. Obviously, monitoring a continuous SPAN setup can be quite involved and challenging. More importantly, if the SPAN port must be turned off, the monitoring tool will no longer receive its data. Tap Versus SPAN The Bottom Line When you are deciding whether to use tap or SPAN in your network monitoring system, the two primary factors on which to base your decision are the type of analysis you plan to performance and the amount of bandwidth that analysis will require. Taps are ideal when analysis requires seeing all traffic, including physical layer errors. Taps are required if your network utilization is moderate to heavy. When it comes to aggregation layer monitoring, taps are often used to ensure that the performance of production network traffic is not being impacted by a SPAN. In a latency measurement environment, taps are highly recommended to avoid the inconsistent queuing delay from a SPAN port. SPAN ports perform well on networks with lower utilization, or when analysis is not affected by dropped packets. SPAN ports on the access layer are suitable and are often used for ondemand short term network and application troubleshooting.

10.1.102.72 / 255.255.0.0 26.7ºc Unnamed S/N: 72020004 Ver: 4 Hit [Enter] for configuration CANCEL ENTER ACI-3030-E36-6 ACI-3031-E04-1 INTELLAFLEX Blade ACI-3032-E36-1 PPS/IRIG IN OUT ACI-3030-E36-6 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 23 24 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 1 2 3 4 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 23 24 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 Packet Aggregator Packet Controller Aggregator Plus Time Stamping GPS ANT Packet Aggregator Technical Brief Taps vs SPAN in Network Monitoring Internet External Aggregation s External Firewalls ABOUT APCON APCON develops innovative, scalable technology solutions to enhance network monitoring, support IT traffic analysis, and streamline IT network management and security. APCON is the industry leader for state-ofthe-art IT data aggregation, filtering, and network switching products, as well as leading-edge managementsoftware support. Organizations in over 40 countries depend on APCON network infrastructure solutions. Customers include Global Fortune 500 companies, banks and financial services institutions, telecommunication service providers, government and military, and computer equipment manufacturers. DMZ Server Switches Internal Firewalls Internal Aggregation APCON Analyzer IDS Forensic Probe D C B A Corp. Intranet Contact Us Please email sales@apcon.com or call 503 682 4050 if you have any questions Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ ios/12-2sx/configuration/guide/book/span.html http://www.cisco.com/c/en/us/td/docs/switches/datacenter/ nexus5000/sw/configuration/guide/cli/cliconfigurationguide/span. html http://www.cisco.com/c/en/us/td/docs/ios/netmgmt/command/ reference/nm_book/nm_15.html APCON, Inc. apcon.com +1 503 682 4050 800 624 6808 2014 APCON, Inc. All Rights Reserved. @APCON company/apcon APCON is an Equal Opportunity Employer MFDV 14025-R1-0414