
Mirroring Configuration
697
n
■
Only non-type-A I/O Modules support the traffic mirroring configuration.
■
To define a destination port for mirroring, you can also enter the port view of
the specified port directly to execute the
mirroring-group
group-id
monitor-port
command. Refer to corresponding command manual for detail.
Configuration example
1
Network requirements:
■
GigabitEthernet 2/0/1 on the switch is connected to the 10.1.1.1/24 network
segment.
■
Mirror the packets from the 10.1.1.1/24 network segment to GigabitEthernet
2/0/4, the destination port.
2
Configuration procedure:
<SW7750> system-view
[SW7750] acl number 2000
[SW7750-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255
[SW7750-acl-basic-2000] quit
[SW7750] mirroring-group 3 local
[SW7750] mirroring-group 3 monitor-port GigabitEthernet 2/0/4
[SW7750] interface GigabitEthernet 2/0/1
[SW7750-GigabitEthernet2/0/1] qos
[SW7750-qosb-GigabitEthernet2/0/1] mirrored-to inbound ip-group 2000
interface GigabitEthernet 2/0/4
Configuring Remote
Traffic Mirroring
Configuration prerequisites
■
ACLs for identifying traffics have been defined. For defining ACLs, refer to
“ACL Configuration” on page 637.
■
The source switch, intermediate switch and the destination switch have been
specified.
■
The reflector port, destination port for mirroring, and remote-probe VLAN have
been specified.
■
Required configurations are performed to ensure Layer 2 connectivity between
the source and destination switches over the remote-probe VLAN.
■
The direction of traffic packets to be monitored has been determined.
■
The remote-probe VLAN has been enabled.
Apply one rule in a link type separately
link-group
{
acl-number
|
acl-name
}
rule
rule-id
Apply all rules in a user-defined ACL
separately
user-group
{
acl-number
|
acl-name
}
Apply one rule in a user-defined ACL
separately
user-group
{
acl-number
|
acl-name
}
rule
rule-id
Apply one rule in an IP type ACL and one rule
in a Link type ACL simultaneously
ip-group
{
acl-number
|
acl-name
}
rule
rule-id
link-group
{
acl-number
|
acl-name
}
rule
rule-id
Table 560
Combined application of ACLs on I/O Module other than A type.
Combination mode
Form of acl-rule
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...