White Papers

Table Of Contents
monitor multicast-queue queue-id
DellEMC(conf)#monitor multicast-queue 7
2 Verify information about monitor congurations.
EXEC mode
EXEC Privilege mode
show run monitor session
DellEMC#show run monitor session
!
monitor multicast-queue 7
DellEMC#
Enabling Flow-Based Monitoring
Flow-based monitoring conserves bandwidth by monitoring only specied trac instead of all trac on the interface. This feature is
particularly useful when looking for malicious trac. It is available for Layer 3 ingress trac. You can specify trac using standard or
extended access-lists.
NOTE: Flow-based monitoring is supported for known unicast egress trac.
1 Create a monitoring session.
CONFIGURATION mode
monitor session session-id
2 Enable ow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
3 Specify the source and destination port and direction of trac.
MONITOR SESSION mode
source source—port destination destination-port direction rx
4 Dene IP access-list rules that include the monitor keyword. For port monitoring, Dell EMC Networking OS only considers trac
matching rules with the
monitor keyword.
CONFIGURATION mode
ip access-list
To dene access lists, see the Access Control Lists (ACLs) chapter.
5 Allocate a CAM region so that you can apply the ACL you created to the monitoring session.
CONFIGURATION mode
cam-acl l2acl number ipv4acl number ipv6acl number ipv4qos number l2qos number l2pt number
ipmacacl number vman-qos number ipv4mirracl number
6 Apply the ACL to the monitored port.
MONITOR SESSION mode
ip access-group access-list-name
704
Port Monitoring