Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING
  • HOME
  • Cisco Networking
    • Cisco General
    • Cisco IOS
    • Cisco VPN
    • Cisco Wireless
  • Cisco ASA
    • Cisco ASA General
    • Cisco ASA Firewall Configuration
  • Certifications Training
    • CCNA Training
    • Cisco Certifications
    • I.T Training
  • General
    • General Networking
    • IP Telephony
    • Network Security
    • Product Reviews
    • Software
  • Cisco Routers
  • Cisco Switches
You are here: Home / Cisco IOS / How to Configure IP Traffic Export on Cisco Routers

How to Configure IP Traffic Export on Cisco Routers

Written By Harris Andrea

Have you ever been in a situation where you needed to capture traffic going through a router?  Have you ever wished you had a switch available to create a SPAN port?  Have you ever asked why you took that small hub out of your computer bag?  With all of these tools you could have simply hooked up and started capturing packet for analysis.  Well, nevermore!

As of 12.3(4)T Cisco has introduced a feature that allow the administrator to configure a router to capture network traffic and review it for analysis.  Have no fear “IP Traffic Exporter” is here!

Lets take a closer look at the configuration of IP Traffic Exporter.

*Note IP Traffic Exporter is applied before Packet Switching and Packet Filtering.

Configuration Tasks:

  1. Create ACL to match desired traffic.
  2. Create IP traffic exporter profile.
  3. Add the desired interface to the profile.
  4. Configure traffic direction with ACL.
  5. Apply traffic exporter to interface.

In the below image, we have created an ACL to match traffic sourced from 192.168.20.69.

MORE READING:  Cisco IOS Zone Based Firewall Configuration Example (ZBF)

traffic export acl

Next we have created the IP traffic exporter profile called SUSPECT_ TRAFFIC and set the mode to capture.

Inside the traffic-export config mode, we set the length of the packet to 512.  We also tell the router that we want to capture outgoing traffic that matches ACL 80.

traffic exporter profile

Just like many other items within IOS once you configure your settings, you must then apply them.

We enter interface configuration mode for the desired interface that we want to capture traffic on.

We apply the traffic-export by entering the following commands:

ip traffic-export apply SUSPECT_TRAFFIC size 1024

*Note: the size command sets the buffer size for the packets.

traffic export on interface

So still after all the configuration and applying the traffic-exporter… we must turn it on.

To do so, we enter the following commands from enable mode.

traffic export start stop

traffic-export interface fa4 start

This command starts the packet capture.

traffic-export interface fa4 stop

Well this command stops the capture.

MORE READING:  How to Disable Telnet and Enable SSH on Cisco Devices

traffic-export interface fa4 copy flash:

This command will copy the capture from the buffer to a file on flash.  This capture can also be copied to a tftp or ftp server, and many other locations.

Verification:

To verify the capture completed correctly you can use your favorite packet analysis tool, my personal favorite is wireshark, to analyze the packets.

Related Posts

  • What is Cisco IOS – Overview and Description of Cisco’s Operating System
  • How to Configure SNMP on Cisco Devices (Routers, Switches)
  • Comparing Cisco IOS Configurations (Config Compare Tools)
  • Cisco Access List Configuration Examples (Standard, Extended ACL) on Routers Etc
  • PPTP Remote Access VPN Configuration on Cisco Routers

Filed Under: Cisco IOS

Download Free Cisco Commands Cheat Sheets

Enter your Email below to Download our Free Cisco Commands Cheat Sheets for Routers, Switches and ASA Firewalls.

We use Elastic Email as our marketing automation service. By submitting this form, you agree that the information you provide will be transferred to Elastic Email for processing in accordance with their Terms of Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.

About Harris Andrea

Harris Andrea is an Engineer with more than two decades of professional experience in the fields of TCP/IP Networks, Information Security and I.T. Over the years he has acquired several professional certifications such as CCNA, CCNP, CEH, ECSA etc.

He is a self-published author of two books ("Cisco ASA Firewall Fundamentals" and "Cisco VPN Configuration Guide") which are available at Amazon and on this website as well.

Comments

  1. Peter Annan says

    August 13, 2012 at 8:23 am

    Hi Andea,
    I am so happy for recoganising me as one of your student may God bless you.

  2. mutesi callixta says

    September 2, 2012 at 10:01 am

    hi,it is so good to have someone like you.thank you so much.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this site

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2023 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy

0 shares