Concept Guide

The next example shows the conguration of an ERPM session in which VLAN 11 is monitored as the source interface and a MAC ACL
lters the monitored ingress trac.
DellEMC(conf)#mac access-list standard flow
DellEMC(config-std-macl)#seq 5 permit 00:00:0a:00:00:0b count monitor
DellEMC#show running-config interface vlan 11
!
interface Vlan 11
no ip address
tagged TenGigabitEthernet 1/1-3
mac access-group flow in <<<<<<<<<<<<<< Only ingress packets are supported for mirroring
shutdown
ERPM Behavior on a typical Dell EMC Networking OS
The Dell EMC Networking OS is designed to support only the Encapsulation of the data received / transmitted at the specied source port
(Port A). An ERPM destination session / decapsulation of the ERPM packets at the destination Switch are not supported.
Figure 105. ERPM Behavior
As seen in the above gure, the packets received/transmitted on Port A will be encapsulated with an IP/GRE header plus a new L2 header
and sent to the destination ip address (Port D’s ip address) on the snier. The Header that gets attached to the packet is 38 bytes long.
If the snier does not support IP interface, a destination switch will be needed to receive the encapsulated ERPM packet and locally mirror
the whole packet to the Snier or a Linux Server.
706
Port Monitoring