beautypg.com

Configuring sflow, Figure 94: upnp configuration – LevelOne GSW-4876 User Manual

Page 211

background image

C

HAPTER

4

| Configuring the Switch

Configuring sFlow

– 211 –

control points how often it or they should receive a SSDP advertisement

message from this switch. Due to the unreliable nature of UDP, the

switch sends SSDP messages periodically at the interval one-half of the

advertising duration minus 30 seconds. (Range: 100-86400 seconds;

Default: 100 seconds)

W

EB

I

NTERFACE

To configure UPnP:

1.

Click Configuration, UPnP.

2.

Enable or disable UPnP, then set the TTL and advertisement values.

3.

Click Save.

Figure 94: UPnP Configuration

C

ONFIGURING

S

F

LOW

Use the sFlow Configuration page to configure periodic sampling of traffic

flows. The flow sampling (sFlow) feature embedded on this switch,

together with a remote sFlow Collector, can provide network administrators

with an accurate, detailed and real-time overview of the types and levels of

traffic present on their network. The sFlow Agent samples 1 out of n

packets from all data traversing the switch, re-encapsulates the samples as

sFlow datagrams and transmits them to the sFlow Collector. This sampling

occurs at the internal hardware level where all traffic is seen, whereas

traditional probes will only have a partial view of traffic as it is sampled at

the monitored interface. Moreover, the processor and memory load

imposed by the sFlow agent is minimal since local analysis does not take

place. The wire-speed transmission characteristic of the switch is thus

preserved even at high traffic levels.

As the Collector receives streams from the various sFlow agents (other

switches or routers) throughout the network, a timely, network-wide

picture of utilization and traffic flows is created. Analysis of the sFlow

stream(s) can reveal trends and information that can be leveraged in the

following ways:

Detecting, diagnosing, and fixing network problems

Real-time congestion management

Understanding application mix (P2P, Web, DNS, etc.) and changes

Identification and tracing of unauthorized network activity