Reference Guide
512 | Port Monitoring
www.dell.com | support.dell.com
Flow-based Monitoring
Flow-based Monitoring is supported only on platform e
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead all traffic on the
interface. This feature is particularly useful when looking for malicious traffic. It is available for Layer 2
and Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.
To configure flow-based monitoring:
View an access-list that you applied to an interface using the command
show ip accounting access-list from
EXEC Privilege mode, as shown in Figure 27-8.
Step Task Command Syntax Command Mode
4 Enable flow-based monitoring for a monitoring session.
flow-based enable
MONITOR SESSION
5 Define in an access-list rules that include the keyword
monitor. FTOS only considers for port monitoring traffic
matching rules with the keyword
monitor.
See Chapter 7, Access Control Lists (ACL), Prefix Lists,
and Route-maps.
ip access-list
CONFIGURATION
6 Apply the ACL to the monitored port. See Chapter 7,
Access Control Lists (ACL), Prefix Lists, and Route-maps.
ip access-group
access-list
INTERFACE










