Waters Network Systems
2800M/MR User’s Manual
Page 95
Figure 5.56– Restore User Configuration
5.20
Security
Function name:
Mirror Configuration
Function description:
The Mirror Configuration is used to monitor the traffic of the network. For example, Port A and Port B
are Monitoring Port and Monitored Port respectively, thus, the traffic received by Port B will be
copied to Port A for monitoring.
Parameter description:
Mode:
Used for the activation or de-activation of Port Mirror function. Default is
disable
.
Monitoring Port:
The monitoring port is used to set the port for monitoring. Valid port is Port 1~26 and the default
is Port 1.
Monitored Ingress Port:
The monitored ingress port is used to set the port to be monitored. It only monitors the packets
received by the port that is set. Click in the check box (
)
beside the port x. Valid ports are
Ports 1~26.
Monitored Egress Port:
The monitored egress port is used to set the port to be monitored. It only monitors the packets
transmitted by the port that has been set. Click in the check box (
)
beside the port x. Valid
ports are Port 1~26.