Administrator Guide

No Enabled
0 Po 1 remote-ip tx Port 1.1.1.1 7.1.1.2 0 255 No 100 111
No Enabled
1 Vl 11 remote-ip rx Flow 5.1.1.1 3.1.1.2 0 255 No 100 139
No Enabled
The next example shows the configuration of an ERPM session in which VLAN 11 is monitored as the source interface and a MAC ACL
filters the monitored ingress traffic.
DellEMC(conf)#mac access-list standard flow
DellEMC(config-std-macl)#seq 5 permit 00:00:0a:00:00:0b count monitor
DellEMC#show running-config interface vlan 11
!
interface Vlan 11
no ip address
tagged GigabitEthernet 1/1-3
mac access-group flow in <<<<<<<<<<<<<< Only ingress packets are supported for mirroring
shutdown
ERPM Behavior on a typical Dell EMC Networking
OS
The Dell EMC Networking OS is designed to support only the Encapsulation of the data received / transmitted at the specified source
port (Port A). An ERPM destination session / decapsulation of the ERPM packets at the destination Switch are not supported.
Figure 98. ERPM Behavior
As seen in the above figure, the packets received/transmitted on Port A will be encapsulated with an IP/GRE header plus a new L2
header and sent to the destination ip address (Port D’s ip address) on the sniffer. The Header that gets attached to the packet is 38 bytes
long.
If the sniffer does not support IP interface, a destination switch will be needed to receive the encapsulated ERPM packet and locally mirror
the whole packet to the Sniffer or a Linux Server.
Port Monitoring
579