Users Guide

Table Of Contents
Configure encapsulated remote port monitoring
Encapsulated remote port monitoring requires valid source and destination IP addresses. Ensure that the source IP address is
local and destination IP address is remote. You can also configure the time-to-live (TTL), which defines the life span of the data
transmitted through the network and differentiated services code point (DSCP) values.
1. Create monitoring session in CONFIGURATION mode.
monitor session session-id type erpm-source
2. Configure source port in MONITOR-SESSION mode.
source interface interface-type {both | rx | tx}
3. Configure source and destination IP addresses, and protocol type in MONITOR-SESSION mode.
source-ip source ip-address destination-ip destination ip-address [gre-protocol
protocol-value]
4. Configure TTL and DSCP values in MONITOR-SESSION mode.
ip {ttl ttl-number | dscp dscp-number}
5. Enable the monitoring interface in MONITOR-SESSION mode.
no shut
Create monitoring session
OS10(config)# monitor session 10 type erpm-source
OS10(conf-mon-erpm-source-10)#
Configure source port, source and destination IP addresses, and protocol type
OS10(conf-mon-erpm-source-10)# source interface ethernet 1/1/2
OS10(conf-mon-erpm-source-10)# source-ip 1.1.1.1 destination-ip 3.3.3.3 gre-protocol
35006
OS10(conf-mon-erpm-source-10)# ip ttl 16
OS10(conf-mon-erpm-source-10)# ip dscp 63
OS10(conf-mon-erpm-source-10)# no shut
View configured ERPM session
OS10(conf-mon-erpm-source-6)# do show monitor session all
S.Id Source Destination Dir Mode Source IP Dest IP DSCP TTL Gre-Protocol
State Reason
-----------------------------------------------------------------------------------------
---------
6 ethernet1/1/2 remote-ip both port 1.1.1.1 3.3.3.3 63 16 35006
true Is UP
View running configuration of monitor session
OS10# show running-configuration monitor
!
monitor session 10 type erpm-source
source-ip 1.1.1.1 destination-ip 3.3.3.3
source interface ethernet1/1/2
no shut
Flow-based monitoring
Flow-based monitoring conserves bandwidth by inspecting only specified traffic instead of all interface traffic. Using flow-based
monitoring, you can monitor only traffic received by the source port that matches criteria in ingress access-lists (ACLs). IPv4
ACLs, IPv6 ACLs, and MAC ACLs support flow-based monitoring.
Layer 2
711