02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Flow-based Monitoring<br />

Flow-based Monitoring is supported only on plat<strong>for</strong>m e<br />

Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead all traffic on <strong>the</strong><br />

interface. This feature is particularly useful when looking <strong>for</strong> malicious traffic. It is available <strong>for</strong> Layer 2<br />

and Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.<br />

To configure flow-based monitoring:<br />

Step Task Command Syntax Command Mode<br />

6 Enable flow-based monitoring <strong>for</strong> a monitoring<br />

session.<br />

7 Define in an access-list rules that include <strong>the</strong> keyword<br />

monitor. <strong>FTOS</strong> only considers <strong>for</strong> port monitoring<br />

traffic matching rules with <strong>the</strong> keyword monitor.<br />

See Chapter 17, IP Access Control Lists, Prefix Lists,<br />

and Route-maps.<br />

8 Apply <strong>the</strong> ACL to <strong>the</strong> monitored port. See Chapter 17,<br />

IP Access Control Lists, Prefix Lists, and<br />

Route-maps.<br />

flow-based enable MONITOR SESSION<br />

ip access-list CONFIGURATION<br />

ip access-group<br />

access-list<br />

INTERFACE<br />

<strong>FTOS</strong> <strong>Configuration</strong> <strong>Guide</strong>, version 7.7.1.0 179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!