This document describes the Access Control List (ACL) capture feature, which is used in order to selectively monitor traffic on an interface or VLAN. When you enable the capture option for an ACL rule, packets that match this rule are either forwarded or dropped based on the specified action and might also be copied to an alternate destination port for further analysis.
A. This feature is analogous to the VLAN Access Control List (VACL) capture feature supported on Catalyst 6000 Series Switch platforms. You can configure an ACL capture in order to selectively monitor traffic on an interface or VLAN. When you enable the capture option for an ACL rule, packets that match this rule are either forwarded or dropped based on the specified permit or deny action and might also be copied to an alternate destination port for further analysis.
A. Only one ACL capture session can be active at any given time in the system across Virtual Device Contexts (VDCs). The ACL Ternary Content Addressable Memory (TCAM) can have as many Application Control Engines (ACEs) in the VACL as can fit.
A. Yes. ACL capture on M1 modules is supported in Cisco NX-OS Release 5.2(1) and later.
A. Yes. ACL capture on M2 modules is supported in Cisco NX-OS Release 6.1(1) and later.
A. F1-Series modules do not support ACL capture.
A. F2-Series modules do not support ACL capture as of now, but this may be in the roadmap. Consult the Business Unit (BU) to confirm.
A. An ACL rule with the capture option can be applied:
A. Yes. Some limitations with the ACL capture feature are:
A. No. The destination can only be one interface configured with the hardware access-list capture command.
A. Yes. Multiple VLANs can be specified in a VLAN-list. For example:
vlan access-map acl-vlan-first
match ip address acl-ipv4-first
match mac address acl-mac-first
action forward
statistics per-entry
vlan filter acl-vlan-first vlan-list 1,2,3
A. The maximum number of supported IP ACL entries is 64,000 for devices without an XL line card and 128,000 for devices with an XL line card.
A. VACL capture occurs after a rewrite, so frames ingressing VLAN X and egressing VLAN Y is captured in VLAN Y.
A. A mix of M1 and M2 cards in the chassis should not have any impact on the use of VACLs.
A. ACL-capture guidelines can be viewed in the Cisco Nexus 7000 Series NX-OS Security Configuration Guide, Release 6.x.
This example shows how to enable an ACL capture in the default VDC and configure a destination for ACL capture packets:
hardware access-list capture
monitor session 1 type acl-capture
destination interface ethernet 2/1
no shut
exit
show ip access-lists capture session 1
This example shows how to enable a capture session for an ACL's ACEs, and then apply the ACL to an interface:
ip access-list acl1
permit tcp any any capture session 1
exit
interface ethernet 1/11
ip access-group acl1 in
no shut
show running-config aclmgr
This example shows how to apply an ACL with capture session ACEs to a VLAN:
vlan access-map acl-vlan-first
match ip address acl-ipv4-first
match mac address acl-mac-first
action foward
statistics per-entry
vlan filter acl-vlan-first vlan-list 1
show running-config vlan 1
This example shows how to enable a capture session for the whole ACL and then apply the ACL to an interface:
ip access-list acl2
capture session 2
exit
interface ethernet 7/1
ip access-group acl1 in
no shut
show running-config aclmg
Revision | Publish Date | Comments |
---|---|---|
1.0 |
12-Jun-2013 |
Initial Release |