3Com Switch 7750 Configuration Guide

696 CHAPTER 62: MIRRORING CONFIGURATION
[SW7750] mirroring-group 1 remote-destination
[SW7750] mirroring-group 1 monitor-port GigabitEthernet 2/0/2
[SW7750] mirroring-group 1 remote-probe vlan 10
[SW7750] display mirroring-group remote-destination
mirroring-group 1: type: remote-destination status: active
monitor port: GigabitEthernet2/0/2 remote-probe vlan: 10
Configuring Local Traffic
Mirroring
Configuration prerequisites
ACLs for identifying traffics have been defined. For defining ACLs, see “ACL
Configuration” on page 637.
The destination port has been defined.
The port on which to perform traffic mirroring configuration and the direction
of traffic mirroring has been determined.
Configuration procedure
acl-rule: Applied ACL rules, the following table describes the ACL combinations.
Table 559 Configure traffic mirroring in Ethernet port view
Operation Command Description
Enter system view system-view -
Create a mirroring group mirroring-group group-id
local
Required
Define the destination port mirroring-group group-id
monitor-port monitor-port
Required
LACP must be disabled on the
mirroring destination port and
you are recommended to
disable STP on the mirroring
destination port.
Enter Ethernet port view of
the source port
interface interface-type
interface-number
-
Enter QoS view qos -
Reference ACLs for identifying
traffic flows and perform
traffic mirroring for packets
that match.
mirrored-to inbound
acl-rule [ system-index
system-index ]{interface
interface-type
interface-number |
mirroring-group group-id }
Required
Display the parameter settings
of traffic mirroring
display qos-interface
[ interface-type
interface-number ]
mirrored-to
Optional
These commands can be
executed in any view.
Display all QoS settings of a
port
display qos-interface
[ interface-type
interface-number ] all
Table 560 Combined application of ACLs on I/O Module other than A type.
Combination mode Form of acl-rule
Apply all rules in an IP type ACL separately ip-group { acl-number | acl-name }
Apply one rule in an IP type ACL separately ip-group { acl-number | acl-name } rule
rule-id
Apply all rules in a link type ACL separately link-group { acl-number | acl-name }