EasyManuals Logo
Home>Dell>Switch>S4820T

Dell S4820T User Manual

Dell S4820T
1178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #756 background imageLoading...
Page #756 background image
Figure 100. Port Monitoring Example
Enabling Flow-Based Monitoring
Flow-based monitoring is supported only on the S-Series platform.
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead of all traffic on
the interface. This feature is particularly useful when looking for malicious traffic. It is available for Layer 2
and Layer 3 ingress and egress traffic. You can specify traffic using standard or extended access-lists.
1. Enable flow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2. Define in access-list rules that include the keyword monitor. For port monitoring, Dell Networking
OS only considers traffic matching rules with the keyword
monitor.
CONFIGURATION mode
ip access-list
Refer to Access Control Lists (ACLs).
3. Apply the ACL to the monitored port.
INTERFACE mode
ip access-group access-list
756
Port Monitoring

Table of Contents

Other manuals for Dell S4820T

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Dell S4820T and is the answer not in the manual?

Dell S4820T Specifications

General IconGeneral
BrandDell
ModelS4820T
CategorySwitch
LanguageEnglish

Related product manuals