Configuring sflow, Figure 94: upnp configuration – LevelOne GSW-4876 User Manual
Page 211
![background image](/manuals/351477/211/background.png)
C
HAPTER
4
| Configuring the Switch
Configuring sFlow
– 211 –
control points how often it or they should receive a SSDP advertisement
message from this switch. Due to the unreliable nature of UDP, the
switch sends SSDP messages periodically at the interval one-half of the
advertising duration minus 30 seconds. (Range: 100-86400 seconds;
Default: 100 seconds)
W
EB
I
NTERFACE
To configure UPnP:
1.
Click Configuration, UPnP.
2.
Enable or disable UPnP, then set the TTL and advertisement values.
3.
Click Save.
Figure 94: UPnP Configuration
C
ONFIGURING
S
F
LOW
Use the sFlow Configuration page to configure periodic sampling of traffic
flows. The flow sampling (sFlow) feature embedded on this switch,
together with a remote sFlow Collector, can provide network administrators
with an accurate, detailed and real-time overview of the types and levels of
traffic present on their network. The sFlow Agent samples 1 out of n
packets from all data traversing the switch, re-encapsulates the samples as
sFlow datagrams and transmits them to the sFlow Collector. This sampling
occurs at the internal hardware level where all traffic is seen, whereas
traditional probes will only have a partial view of traffic as it is sampled at
the monitored interface. Moreover, the processor and memory load
imposed by the sFlow agent is minimal since local analysis does not take
place. The wire-speed transmission characteristic of the switch is thus
preserved even at high traffic levels.
As the Collector receives streams from the various sFlow agents (other
switches or routers) throughout the network, a timely, network-wide
picture of utilization and traffic flows is created. Analysis of the sFlow
stream(s) can reveal trends and information that can be leveraged in the
following ways:
◆
Detecting, diagnosing, and fixing network problems
◆
Real-time congestion management
◆
Understanding application mix (P2P, Web, DNS, etc.) and changes
◆
Identification and tracing of unauthorized network activity