White Papers

Table Of Contents
NOTE: Source as VLAN is achieved via Flow based mirroring. Please refer section Enabling Flow-Based Monitoring.
In the following example, the host and server are exchanging traffic which passes through the uplink interface 1/1. Port
1/1 is the monitored port and port 1/42 is the destination port, which is configured to only monitor traffic received on
tengigabitethernet 1/1 (host-originated traffic).
Figure 105. Port Monitoring Example
Enabling Flow-Based Monitoring
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead of all traffic on the interface. This
feature is particularly useful when looking for malicious traffic. It is available for Layer 3 ingress traffic. You can specify traffic
using standard or extended access-lists.
NOTE: Flow-based monitoring is supported for known unicast egress traffic.
1. Create a monitoring session.
CONFIGURATION mode
monitor session session-id
2. Enable flow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
3. Specify the source and destination port and direction of traffic.
MONITOR SESSION mode
source sourceport destination destination-port direction rx
4. Define IP access-list rules that include the monitor keyword. For port monitoring, Dell EMC Networking OS only considers
traffic matching rules with the monitor keyword.
CONFIGURATION mode
ip access-list
To define access lists, see the Access Control Lists (ACLs) chapter.
5. Allocate a CAM region so that you can apply the ACL you created to the monitoring session.
CONFIGURATION mode
650
Port Monitoring