Wireshark - Cisco Catalyst 4500 Series Configuration Manual

Release ios xe 3.3.0sg and ios 15.1(1)sg
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Security Features
For information on WCCP, see

Wireshark

Wireshark is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and
Note
Catalyst 4500X-32.
Starting with Cisco IOS Release XE 3.3.0SG and the IP Base and Enterprise Services feature sets, the
Catalyst 4500 series switch supports Wireshark. This is a packet analyzer program, formerly known as
Ethereal that supports multiple protocols and presents information in a graphical and text-based user
interface. Wireshark is applied or enabled on an individual interface; global packet capture is not
supported.
For information on Wireshark, see
XML-PI
eXtensible Markup Language Programmatic Interface (XML-PI) Release 1.0 leverages the Network
Configuration Protocol (NETCONF). It provides new data models that collect running configurations
and show command output down to the keyword level without requiring the technologies or external
XML-to-command line interface (CLI) gateways. XML-PI allows you to develop XML-based network
management applications to control any number of network devices simultaneously.
Refer to the following link for more details:
http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_xmlpi_v1.html
Security Features
The Catalyst 4500 series switch offers network management and control through the CLI or through
alternative access methods, such as SNMP. The switch software supports these security features:
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
1-30
802.1X Identity-Based Network Security, page 1-31
Cisco TrustSec Security Architecture, page 1-32
Cisco TrustSec MACsec Encryption, page 1-33
Dynamic ARP Inspection, page 1-33
Dynamic Host Configuration Protocol Snooping, page 1-33
Flood Blocking, page 1-34
Hardware-Based Control Plane Policing, page 1-34
IP Source Guard, page 1-34
IP Source Guard for Static Hosts, page 1-34
Local Authentication, RADIUS, and TACACS+ Authentication, page 1-35
Network Admission Control, page 1-35
Network Security with ACLs, page 1-35
Chapter 69, "Configuring WCCP Version 2 Services."
Chapter 56, "Configuring Wireshark."
Chapter 1
Product Overview
OL-25340-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents