Aw, setting it first is always helpful.:)

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Jason Roysdon
Sent: Saturday, December 02, 2000 4:52 PM
To: [EMAIL PROTECTED]
Subject: Re: Is there a command to view what kind of traffic in router's
serialport


Actually, I had the command I meant.  The one thing I didn't mention is that
you must specify 'ip route-cache flow' for any interface you wish to view
with 'sh ip cache flow.'  After which, you'll be rewarded with information
such as the following:

#sh ip cache flow
IP packet size distribution (15230 total packets):
   1-32   64   96  128  160  192  224  256  288  320  352  384  416  448
480
   .000 .348 .000 .000 .000 .000 .001 .000 .000 .000 .000 .000 .000 .000
.000

    512  544  576 1024 1536 2048 2560 3072 3584 4096 4608
   .000 .000 .000 .000 .647 .000 .000 .000 .000 .000 .000

IP Flow Switching Cache, 278544 bytes
  3 active, 4093 inactive, 42 added
  1075 ager polls, 0 flow alloc failures
  Active flows timeout in 30 minutes
  Inactive flows timeout in 15 seconds
  last clearing of statistics never
Protocol         Total    Flows   Packets Bytes  Packets Active(Sec)
Idle(Sec)
--------         Flows     /Sec     /Flow  /Pkt     /Sec     /Flow     /Flow
TCP-Telnet           5      0.0        19    40      0.0      10.9      15.8
TCP-NNTP             2      0.0         5    63      0.0       0.6      15.4
TCP-other            2      0.0        20   163      0.0       4.7       1.9
UDP-DNS              1      0.0         1    55      0.0       0.0      15.4
UDP-NTP              9      0.0         1    76      0.0       0.0      15.6
UDP-other           20      0.0         1   149      0.0       0.0      15.5
Total:              39      0.0         4    83      0.0       1.6      14.9

SrcIf         SrcIPaddress    DstIf         DstIPaddress    Pr SrcP DstP
Pkts
Et1           192.168.45.11   Local         192.168.45.254  06 0437 0017
7
Et1           192.168.45.11   Null          207.92.43.4     06 044D 06BE
5183
Et0           207.92.43.4     Local         63.206.176.163  06 06BE 044D
9870

It doesn't know all protocols.  For instance, a large ftp I having going
falls under UDP-other (IE's ftp doesn't maintain tcp sessions).  I went back
and used the ftp.exe util and got:
#sh ip cache flow
IP packet size distribution (31565 total packets):
   1-32   64   96  128  160  192  224  256  288  320  352  384  416  448
480
   .000 .350 .001 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
.000

    512  544  576 1024 1536 2048 2560 3072 3584 4096 4608
   .000 .000 .000 .000 .646 .000 .000 .000 .000 .000 .000

IP Flow Switching Cache, 278544 bytes
  6 active, 4090 inactive, 95 added
  2311 ager polls, 0 flow alloc failures
  Active flows timeout in 30 minutes
  Inactive flows timeout in 15 seconds
  last clearing of statistics never
Protocol         Total    Flows   Packets Bytes  Packets Active(Sec)
Idle(Sec)
--------         Flows     /Sec     /Flow  /Pkt     /Sec     /Flow     /Flow
TCP-Telnet          11      0.0        10    40      0.0       6.9      15.7
TCP-FTP              4      0.0        17    81      0.0      17.2      15.6
TCP-FTPD             4      0.0         4   125      0.0       0.4       1.4
TCP-NNTP             2      0.0         5    63      0.0       0.6      15.4
TCP-other            4      0.0      6737   994      0.0     169.3       1.6
UDP-DNS              4      0.0         1    57      0.0       0.0      15.4
UDP-NTP             18      0.0         1    76      0.0       0.0      15.6
UDP-other           42      0.0         1   148      0.0       0.0      15.5
Total:              89      0.0       306   985      0.0       9.2      14.3

SrcIf         SrcIPaddress    DstIf         DstIPaddress    Pr SrcP DstP
Pkts
Et1           192.168.45.14   Local         192.168.45.254  06 04BB 0017
1
Et1           192.168.45.11   Local         192.168.45.254  06 0437 0017
54
Et0           207.92.43.4     Local         63.206.176.163  06 0014 0455
2782
Et1           192.168.45.11   Null          207.92.43.4     06 0455 0014
1501
Et1           192.168.45.252  Null          224.0.0.9       11 0208 0208
1
Et1           192.168.45.253  Null          224.0.0.9       11 0208 0208
1

Anyway, hope this helps.  No sure off the top of my head which IOS this was
adding in, but I'm betting at least 12.0.

--
Jason Roysdon, CCNA, MCSE, CNA, Network+, A+
List email: [EMAIL PROTECTED]
Homepage: http://jason.artoo.net/
Cisco resources: http://r2cisco.artoo.net/


"Sam Adams" <[EMAIL PROTECTED]> wrote in message
000201c05c84$fc29cc10$075901c0@meanboy4">news:000201c05c84$fc29cc10$075901c0@meanboy4...
> The actual command is
>
> show ip cache A.B.C.D
>   Ethernet  IEEE 802.3
>   Loopback  Loopback interface
>   Null      Null interface
>   Serial    Serial
>   policy    policy cache entries
>   verbose   display extra information
>   <cr>
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Jason Roysdon
> Sent: Saturday, December 02, 2000 4:43 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Is there a command to view what kind of traffic in router's
> serial port
>
>
> If you have ip route-cache enabled on an interface, the following will
work:
> show ip cache flow
>
> --
> Jason Roysdon, CCNA, MCSE, CNA, Network+, A+
> List email: [EMAIL PROTECTED]
> Homepage: http://jason.artoo.net/
> Cisco resources: http://r2cisco.artoo.net/
>
>
> ""Sim, CT (Chee Tong)"" <[EMAIL PROTECTED]> wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Dear all,
> >
> > Is there a command to view what kind of traffic eg FTP, TELNET passing
> thru
> > the router's serial port?
> >
> > Tong
> >
> > ==================================================================
> > De informatie opgenomen in dit bericht kan vertrouwelijk zijn en
> > is uitsluitend bestemd voor de geadresseerde. Indien u dit bericht
> > onterecht ontvangt wordt u verzocht de inhoud niet te gebruiken en
> > de afzender direct te informeren door het bericht te retourneren.
> > ==================================================================
> > The information contained in this message may be confidential
> > and is intended to be exclusively for the addressee. Should you
> > receive this message unintentionally, please do not use the contents
> > herein and notify the sender immediately by return e-mail.
> >
> >
> > ==================================================================
> >
> > _________________________________
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> >
>
>
> _________________________________
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
> _________________________________
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_________________________________
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to