EasyManua.ls Logo

Dell Force10 S4810P - Flow-Based Monitoring

Dell Force10 S4810P
1144 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Port Monitoring | 793
Flow-based Monitoring
Flow-based Monitoring is supported only on platform e
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead all traffic on the
interface. This feature is particularly useful when looking for malicious traffic. It is available for Layer 2
and Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.
To configure flow-based monitoring:
View an access-list that you applied to an interface using the command
show ip accounting access-list from
EXEC Privilege mode, as shown in Figure 36-8.
Step Task Command Syntax Command Mode
4 Enable flow-based monitoring for a monitoring session.
flow-based enable
MONITOR SESSION
5 Define in an access-list rules that include the keyword
monitor. FTOS only considers for port monitoring traffic
matching rules with the keyword monitor.
See Chapter 7, Access Control Lists (ACLs).
ip access-list
CONFIGURATION
6 Apply the ACL to the monitored port. See Chapter 7,
Access Control Lists (ACLs).
ip access-group
access-list
INTERFACE
1/2
1/1
Host
Sniffer
Server
1/3
F
TOS(conf-if-gi-1/2)#show config
!
i
nterface GigabitEthernet 1/2
no ip address
no shutdown
F
TOS(conf)#monitor session 0
F
TOS(conf-mon-sess-0)#source gig 1/1 destination gig 1/2 direction rx
Server Traffic
Host Traffic
Port Monitoring 001

Table of Contents

Other manuals for Dell Force10 S4810P

Related product manuals