Enabling Flow-Based Monitoring; Configuring Ip Mirror Access Group - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

Example Output of the show Command
(conf-mon-sess-11)#show config
!
monitor session 11
source TenGigabitEthernet 1/1/1/1 destination TenGigabitEthernet 1/1/1 direction both
The show ip | mac | ipv6 accounting commands have been enhanced to display whether monitoring is enabled for traffic that
matches with the rules of the specific ACL.
Example Output of the show Command
Dell# show ip accounting access-list
!
Extended Ingress IP access list kar on TenGigabitEthernet 1/1/1/1
Total cam count 1
seq 5 permit ip 192.168.20.0/24 173.168.20.0/24 monitor
Dell#show ipv6 accounting access-list
!
Ingress IPv6 access list kar on TenGigabitEthernet 1/1/1/1
Total cam count 1
seq 5 permit ipv6 22::/24 33::/24 monitor

Enabling Flow-Based Monitoring

Flow-based monitoring is supported on the platform.
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead of all traffic on the interface. This feature is
particularly useful when looking for malicious traffic. It is available for Layer 2 and Layer 3 ingress and egress traffic. You can specify traffic
using standard or extended access-lists.
1
Enable flow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2
Define access-list rules that include the keyword monitor. Dell Networking OS only considers port monitoring traffic that matches
rules with the keyword monitor.
CONFIGURATION mode
ip access-list
For more information, see
3
Apply the ACL to the monitored port.
INTERFACE mode
ip access-group access-list
Example of the flow-based enable Command
To view an access-list that you applied to an interface, use the show ip accounting access-list command from EXEC Privilege
mode.

Configuring IP Mirror Access Group

To configure an IP mirror access group on an interface, use the following commands:
1
Allocate CAM profile for IPv4 ACL.
136
Access Control Lists (ACLs)
flow-based enable
Access Control Lists
(ACLs).

Advertisement

Table of Contents
loading

Table of Contents