If the sniffer does not support IP interface, a destination switch will be needed to receive the encapsulated
ERPM packet and locally mirror the whole packet to the Sniffer or a Linux Server.
Decapsulation of ERPM packets at the
Destination IP/ Analyzer
• In order to achieve the decapsulation of the original payload from the ERPM header. The below two
methods are suggested :
a
Using Network Analyzer
• Install any well-known Network Packet Analyzer tool which is open source and free to
download.
• Start capture of ERPM packets on the Sniffer and save it to the trace file (for example :
erpmwithheader.pcap).
• The Header that gets attached to the packet is 38 bytes long. In case of a packet with L3
VLAN, it would be 42 bytes long. The original payload /original mirrored data starts from the
39
th
byte in a given ERPM packet. The first 38/42 bytes of the header needs to be ignored/
chopped off.
• Some tools support options to edit the capture file. We can make use of such features (for
example:
editcap
) and chop the ERPM header part and save it to a new trace file. This new
file (i.e. the original mirrored packet) can be converted back into stream and fed to any egress
interface.
b
Using Python script
• Either have a Linux server's ethernet port ip as the ERPM destination ip or connect the ingress
interface of the server to the ERPM MirrorToPort. The analyzer should listen in the forward/
egress interface. If there is only one interface, one can choose the ingress and forward
interface to be same and listen in the tx direction of the interface.
• Download/ Write a small script (for example:
erpm.py
) such that it will strip the given ERPM
packet starting from the bit where GRE header ends. Basically all the bits after 0x88BE need to
be removed from the packet and sent out through another interface.
• This script
erpm.zip
is available for download at the following location:
http://en.community.dell.com/techcenter/networking/m/force10_networking_scripts/20438882.aspx
• Unzip the
erpm.zip
and copy the erpm.py file to the Linux server.
• Run the python script using the following command:
python erpm.py -i <ingress interface> -o <egress interface>
erpm.py : This is the script downloaded from the script store.
<Ingress interface>
: Specify the interface id which is connected to the mirroring port or this should be
interface whose ip address has been specified as the destination ip address in the ERPM session.
Port Monitoring
807
Содержание S4048T
Страница 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Страница 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Страница 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Страница 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Страница 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Страница 591: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 591 ...
Страница 594: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command Link Aggregation Control Protocol LACP 594 ...
Страница 595: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 595 ...
Страница 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Страница 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Страница 648: ...Figure 89 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 648 ...
Страница 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Страница 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Страница 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...
Страница 1179: ...Figure 147 Create Hypervisor Figure 148 Edit Hypervisor Figure 149 Create Transport Connector Virtual Extensible LAN VXLAN 1179 ...