Administrator Guide

Table Of Contents
The ACL agent module saves monitoring details in its local database and also in the CAM region to monitor packets that match
the specified criterion. The ACL agent maintains data on the source port, the destination port, and the endpoint to which the
packet must be forwarded when a match occurs with the ACL entry.
If you configure the flow-based enable command and do not apply an ACL on the source port or the monitored port, both
flow-based monitoring and port mirroring do not function. Flow-based monitoring is supported only for ingress traffic and not
for egress packets.
The port mirroring application maintains a database that contains all monitoring sessions (including port monitor sessions). It
has information regarding the sessions that are enabled for flow-based monitoring and those sessions that are not enabled for
flow-based monitoring. It downloads monitoring configuration to the ACL agent whenever the ACL agent is registered with the
port mirroring application or when flow-based monitoring is enabled.
The show monitor session session-id command has been enhanced to display the Type field in the output, which
indicates whether a particular session is enabled for flow-monitoring.
Example Output of the show Command
Dell(conf-mon-sess-0)#do show monitor session 0
SessID Source Destination Dir Mode Source IP Dest IP
------ ------ ----------- --- ---- --------- --------
0 Te 1/1 Te 1/2 rx Flow N/A N/A
The show config command has been modified to display monitoring configuration in a particular session.
Example Output of the show Command
The show ip | mac | ipv6 accounting commands have been enhanced to display whether monitoring is enabled for
traffic that matches with the rules of the specific ACL.
Example Output of the show Command
Dell# show ip accounting access-list
!
Extended Ingress IP access list kar on TenGigabitEthernet 1/1
Total cam count 1
seq 5 permit ip 192.168.20.0/24 173.168.20.0/24 monitor
Dell#show ipv6 accounting access-list
!
Ingress IPv6 access list kar on TenGigabitEthernet 1/1
Total cam count 1
seq 5 permit ipv6 22::/24 33::/24 monitor
Enabling Flow-Based Monitoring
Flow-based monitoring is supported on the Z9000 platform.
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead of all traffic on the interface. This
feature is particularly useful when looking for malicious traffic. It is available for Layer 2 and Layer 3 ingress and egress traffic.
You can specify traffic using standard or extended access-lists.
1. Enable flow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2. Define access-list rules that include the keyword monitor. Dell Networking OS only considers port monitoring traffic that
matches rules with the keyword monitor.
CONFIGURATION mode
ip access-list
For more information, see Access Control Lists (ACLs).
3. Apply the ACL to the monitored port.
INTERFACE mode
ip access-group access-list
104
Access Control Lists (ACLs)