Users Guide
 mac access-group flow in <<<<<<<<<<<<<< Only ingress packets are supported for mirroring
 shutdown
ERPM Behavior on a typical Dell Networking OS 
The Dell Networking OS is designed to support only the Encapsulation of the data received / transmitted at the specified 
source port (Port A). An ERPM destination session / decapsulation of the ERPM packets at the destination Switch are not 
supported.
Figure 102. ERPM Behavior
As seen in the above figure, the packets received/transmitted on Port A will be encapsulated with an IP/GRE header plus a new 
L2 header and sent to the destination ip address (Port Dās ip address) on the sniffer. The Header that gets attached to the packet 
is 38 bytes long.
If the sniffer does not support IP interface, a destination switch will be needed to receive the encapsulated ERPM packet and 
locally mirror the whole packet to the Sniffer or a Linux Server.
Decapsulation of ERPM packets at the Destination IP/ 
Analyzer
⢠In order to achieve the decapsulation of the original payload from the ERPM header. The below two methods are 
suggested :
a Using Network Analyzer
ā Install any well-known Network Packet Analyzer tool which is open source and free to download.
ā Start capture of ERPM packets on the Sniffer and save it to the trace file (for example : erpmwithheader.pcap).
Port Monitoring 663










