Users Guide
Example Output of the show Command
Dell# show ip accounting access-list
!
Extended Ingress IP access list kar on TenGigabitEthernet 1/1/1/1
Total cam count 1
seq 5 permit ip 192.168.20.0/24 173.168.20.0/24 monitor
Dell#show ipv6 accounting access-list
!
Ingress IPv6 access list kar on TenGigabitEthernet 1/1/1/1
Total cam count 1
seq 5 permit ipv6 22::/24 33::/24 monitor
Enabling Flow-Based Monitoring
Flow-based monitoring is supported on the platform.
Flow-based monitoring conserves bandwidth by monitoring only specied trac instead of all trac on the interface. This feature is
particularly useful when looking for malicious trac. It is available for Layer 2 and Layer 3 ingress and egress trac. You can specify trac
using standard or extended access-lists.
1 Enable ow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2 Dene access-list rules that include the keyword monitor. Dell Networking OS only considers port monitoring trac that matches
rules with the keyword monitor.
CONFIGURATION mode
ip access-list
For more information, see Access Control Lists (ACLs).
3 Apply the ACL to the monitored port.
INTERFACE mode
ip access-group access-list
Example of the flow-based enable Command
To view an access-list that you applied to an interface, use the show ip accounting access-list command from EXEC Privilege
mode.
Access Control Lists (ACLs)
127










