Skip to main content

Discover Features & Capabilities - Cisco Catalyst 3850 With Integrated Wireless LAN Controller (WLC)

cisco catalyst 3850 overviewThere’s a new switch around the block and its name is Catalyst 3850 – Cisco’s latest addition to its successful Catalyst series switches. The Cisco Catalyst 3850 is no ordinary switch – it’s fully stackable and designed to integrate wired and wireless networks by offering full switch and the industry’s first built in wireless LAN controller.

With 480Gbps stacking bandwidth, support for 802.11ac (at least 500Mbit/sec single link throughput) wireless, Power over Ethernet Plus (30Watt/ port), StackPower and Flexible NetFlow support on all ports, this is one of the most comprehensive list of features ever produced in a Catalyst switch.

Cisco 3850 Integrated Wireless Controller

Perhaps one of the features most engineers and managers would have asked for is now available with the new 3850 series. The integrated wireless controller allows organizations to invest in one switch that will cover their wired and wireless needs, and we are not talking about a simple wireless LAN controller.

The wireless capabilities provided by the new Catalyst 3850 are nothing less than impressive. With support for up to 50 access points, 2000 wireless clients per 3850 switch/stack, support of the new upcoming 802.11ac standard that allows throughput of at least 500Mbps per link and, get ready for it, a total of 40Gbps wireless throughput (20Gbps on 24port models) - makes this switch blazingly fast with enough room to cover today’s and tomorrow’s wireless needs.

Each Cisco Catalyst 3850 switch/stack can operate the Wireless Controller in two modes:  Mobility Agent (MA) or Mobility Controller (MC).

Mobility Agent is the default mode where the switch is capable of terminating CAPWAP tunnels from access points and provide wireless connectivity to wireless clients. Mobility Agent mode requires the IP Base license installed.

Mobility Controller mode allows the Catalyst 3850 to perform additional tasks such as radio resource management (RRM), Cisco Clean Air coordination inside a mobility subdomain. Mobility Controller mode is supported in the IP Base license and can be enabled via CLI.

cisco catalyst 3850 front and network modules

Catalyst 3850 Features

The Catalyst 3850 comes in 3 different configurations: Non-PoE, PoE+ and Full PoE+ support.

Each configuration supports 24 or 48 ports, except for Full PoE+ which is only supported in the 48 port version as shown in the table below:

Models

Total 10/100/1000 Ethernet Ports

Default AC Power Supply

Available PoE Power

StackPower

 WS-C3850-24T

 24

 350WAC

-

 Yes

 WS-C3850-48T

 48

 WS-C3850-24P

 24 PoE+

 715WAC

 435W

 WS-C3850-48P

 48 PoE+

 WS-C3850-48F

 48 PoE+

 1100WAC

 800W

Full PoE+ configurations guarantees 30watts of PoE power on all ports.

More features include:

  • Integrated Wireless Controller.  Supports up to 50 access points and 2000 wireless clients on each individual switch or stack.
  • Dual Power Supply. Combine up to two power supplies in each switch.
  • Cisco StackPower. Allows power stacking between stack members for power redundancy.
  • StackWise Technology. Stack your 3850’s together and create one single manageable switch with 480Gbps of bandwidth – enough to satisfy the most demanding network environments
  • Full PoE+ support (IEEE 802.3at)
  • Cisco IOS software support. Engineers with experience in IOS will have no trouble learning to operate and configure the new features offered.
  • Enhanced limited lifetime warranty (E-LLW) with next business day (NBD) advanced hardware replacement and 90-days Cisco Technical Assistance Center Support (Cisco TAC).

catalyst 3850 stackwise powerstack dual power supply

Network Modules

The Catalyst 3850 supports three optional network modules for optical uplinks to other switches or central servers. As shown in the table below, the network modules allow support for the following configurations:

  • 4 x 1 Gigabit Ethernet via SFP modules
  • 2 x 10 Gigabit Ethernet via SFP+ modules
  • 4 x 40 Gigabit Ethernet via SFP+ modules (Only on 48-port models)

Product Number

Product Description

 C3850-NM-4-1G

 4 x Gigabit Ethernet network modules

 C3850-NM-2-10G

 4 x Gigabit Ethernet/2 x 10 Gigabit Ethernet network modules

 C3850-NM-4-10G

 4 x Gigabit Ethernet/4 x 10 Gigabit Ethernet network modules

For a comprehensive list of features, services and configurations, readers can download the Cisco Catalyst 3850 Datasheet, now available in our Cisco Product Datashets and Guides download section.

  • Hits: 70387

Configuring SPAN On Cisco Catalyst Switches - Monitor & Capture Network Traffic/Packets

Being able to monitor your network traffic is essential when it comes to troubleshooting problems, performing a security audit or even casually checking your network for suspicious traffic.

Back in the old days whenever there was a need to monitor or capture network traffic, a hub would be introduced somewhere in the network link and, thanks to the hub’s inefficient design, it would copy all packets incoming from one port out to all the rest of the ports, making it very easy to monitor network traffic. Those interested in hub fundamentals can read our Hubs & Repeaters article.

Of course switches work on an entirely different principle and do not replicate unicast packets out of every port on the switch, but keep them isolated unless it’s a broadcast or multicast.

Thankfully, monitoring network traffic on Cisco Catalyst switches is a straightforward process and does not require the presence of a hub. The Cisco method is called Switched Port Analyser also known as  SPAN.

Understanding SPAN Terminology

  • Ingress Traffic: Traffic that enters the switch
  • Egress Traffic: Traffic that leaves the switch
  • Source (SPAN) port: A port that is monitored
  • Source (SPAN) VLAN: A VLAN whose traffic is monitored
  • Destination (SPAN) port: A port that monitors source ports. This is usually the point to which a network analyser is connected.
  • Remote SPAN (RSPAN): When Source ports are not located on the same switch as the Destination port. RSPAN is an advanced feature that requires a special VLAN to carry the monitored traffic and is not supported by all switches. RSPAN explanation and configuration will be covered in another article.

cisco-switches-span-1Figure 1. The network diagram above helps us understand the terminology and implementation of SPAN.

Source SPAN ports are monitored for received (RX - Ingress), transmitted (TX - Egress) or bidirectional (both) traffic.  Traffic entering or exiting the Source SPAN ports is mirrored to the Destination SPAN port. Typically, you would connect a PC with a network analyser  on the Destination SPAN port, and configure it to capture and analyse the traffic.

The amount of information you can obtain from a SPAN session really depends on how well the captured data can be interpreted and understood. A reliable Network Analyser will not only show the captured packets but automatically diagnose problems such as TCP retransmissions, DNS failures, slow TCP responses, ICMP redirect messages and much more. These capabilities help any engineer to quickly locate network problems which otherwise could not be easily found.

Basic Characteristics & Limitations Of Source Port

A source port has the following characteristics:

  • It can be any port type such as EtherChannel, Fast Ethernet, Gigabit Ethernet and so forth.
  • It can be monitored in multiple SPAN sessions.
  • It cannot be a destination port (that’s where the packet analyser is connected)
  • Each source port can be configured with a direction (ingress, egress, or both) to monitor. For EtherChannel sources, the monitored direction applies to all physical ports in the group.
  • Source ports can be in the same or different VLANs.
  • For VLAN SPAN sources, all active ports in the source VLAN are included as source ports.

Basic Characteristics & Limitations Of Destination Port

Each SPAN session must have a destination port that receives a copy of the traffic from the source ports and VLANs.

A destination port has these characteristics:

  • A destination port must reside on the same switch as the source port (for a local SPAN session).
  • A destination port can be any Ethernet physical port.
  • A destination port can participate in only one SPAN session at a time.
  • A destination port in one SPAN session cannot be a destination port for a second SPAN session.
  • A destination port cannot be a source port.
  • A destination port cannot be an EtherChannel group.

Limitations Of SPAN On Cisco Catalyst Models

Following are the limitations of SPAN on various Cisco Catalyst switches:

  • Cisco Catalyst 2950 switches are only able to have one SPAN session active at a time and can monitor source ports. These switches cannot monitor VLAN source.
  • Cisco Catalyst switches can forward traffic on a destination SPAN port in Cisco IOS 12.1(13)EA1 and later
  • Cisco Catalyst 3550, 3560 and 3750 switches can support up to two SPAN sessions at a time and can monitor source ports as well as VLANs
  • The Catalyst 2970, 3560, and 3750 switches do not require the configuration of a reflector port when you configure an RSPAN session.
  • The Catalyst 3750 switches support session configuration with the use of source and destination ports that reside on any of the switch stack members.
  • Only one destination port is allowed per SPAN session and the same port cannot be a destination port for multiple SPAN sessions. Therefore, you cannot have two SPAN sessions that use the same destination port.

Configuring SPAN On Cisco Catalyst Switches

Our test-bed was a Cisco Catalyst 3550 Layer 3 switch, however, the commands used are fully supported on all Cisco Catalyst 2940, 2950, 2955, 2960, 2970, 3550, 3560, 3560−E, 3750, 3750−E and 4507R Series Switches.

The diagram below represents a typical network setup where there is a need to monitor traffic entering (Ingress) and exiting (Egress) the port to which the router connects (FE0/1). This strategically selected port essentially monitors all traffic entering and exiting our network.

Since router R1 connects to the 3550 Catalyst switch on port FE0/1, this port is configured as the Source SPAN port. Traffic copied from FE0/1 is to be mirrored out FE0/24 where our monitoring workstation is waiting to capture the traffic.

Once we have our network analyser setup and running, the first step is to configure FastEthernet 0/1 as a source SPAN port:

Catalyst-3550(config)# monitor session 1 source interface fastethernet 0/1

Next, configure FastEthernet 0/24 as the destination SPAN port:

Catalyst-3550(config)# monitor session 1 destination interface fastethernet 0/24

After entering both commands, we noticed our destination’s SPAN port LED (FE0/24) began flashing in synchronisation with that of FE0/1’s LED – an expected behaviour considering all FE0/1 packets were being copied to FE0/24.

Confirming the monitoring session and operation requires one simple command, show monitor session 1:

Catalyst-3550#  show monitor session 1
Session 1
---------
Type           : Local Session
Source Ports   :
Both           : Fa0/1
Destination Ports : Fa0/24
    Encapsulation : Native
          Ingress : Disabled


To display the detailed information from a saved version of the monitor configuration for a specific session, issue the show monitor session 1 detail command:

Catalyst-3550# show monitor session 1 detail
Session 1
---------
Type              : Local Session
Source Ports      :
    RX Only       : None
    TX Only       : None
    Both          : Fa0/1
Source VLANs      :
    RX Only       : None
    TX Only       : None
    Both          : None
Source RSPAN VLAN : None
Destination Ports    : Fa0/24
    Encapsulation    : Native
          Ingress:    Disabled
Reflector Port       : None
Filter VLANs         : None
Dest RSPAN VLAN    : None

Notice how the Source Ports section shows Fa0/1 for the row named Both. This means that we are monitoring both RX & TX packets for Fa0/1, while the Destination Port is set to Fa0/24.

Turning to our network analyser, thanks to its predefined filters we were able to catch packets to and from the worksation monitored:

This completes our discussion on SPAN configuration and how to monitor/capture packets on a Cisco Catalyst switch. Upcoming articles will cover RSPAN and more advanced packet capturing techniques using dedicated VLANs for captured traffic and other complex scenarios.

  • Hits: 181715