Service Manual

based monitoring. It downloads monitoring conguration to the ACL agent whenever the ACL agent is registered with the port
mirroring application or when ow-based monitoring is enabled.
The show monitor session session-id command has been enhanced to display the Type eld in the output, which
indicates whether a particular session is enabled for ow-monitoring.
Example Output of the show Command
Dell(conf-mon-sess-0)#do show monitor session 0
SessID Source Destination Dir Mode Source IP Dest IP
------ ------ ----------- --- ---- --------- --------
0 Gi 1/1 Gi 1/2 rx Flow N/A N/A
The show config command has been modied to display monitoring conguration in a particular session.
Example Output of the show Command
(conf-mon-sess-11)#show config
!
monitor session 11
flow-based enable
source GigabitEthernet 1/1 destination GigabitEthernet 1/1 direction both
The show ip | mac | ipv6 accounting commands have been enhanced to display whether monitoring is enabled for
trac that matches with the rules of the specic ACL.
Example Output of the show Command
Dell# show ip accounting access-list
!
Extended Ingress IP access list kar on GigabitEthernet 1/1
Total cam count 1
seq 5 permit ip 192.168.20.0/24 173.168.20.0/24 monitor
Dell#show ipv6 accounting access-list
!
Ingress IPv6 access list kar on GigabitEthernet 1/1
Total cam count 1
seq 5 permit ipv6 22::/24 33::/24 monitor
Enabling Flow-Based Monitoring
Flow-based monitoring is supported on the platform.
Flow-based monitoring conserves bandwidth by monitoring only specied trac instead of all trac on the interface. This feature is
particularly useful when looking for malicious trac. It is available for Layer 2 and Layer 3 ingress and egress trac. You can specify
trac using standard or extended access-lists.
1. Enable ow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2. Dene access-list rules that include the keyword monitor. Dell Networking OS only considers port monitoring trac that
matches rules with the keyword monitor.
CONFIGURATION mode
ip access-list
For more information, see Access Control Lists (ACLs).
3. Apply the ACL to the monitored port.
INTERFACE mode
134
Access Control Lists (ACLs)