ERPM Behavior on a typical Dell Networking OS
The Dell Networking OS is designed to support only the Encapsulation of the data received / transmitted
at the specified source port (Port A). An ERPM destination session / decapsulation of the ERPM packets at
the destination Switch are not supported.
As seen in the above figure, the packets received/transmitted on Port A will be encapsulated with an
IP/GRE header plus a new L2 header and sent to the destination ip address (Port Dā€™s ip address) on the
sniffer. The Header that gets attached to the packet is 38 bytes long.
If the sniffer does not support IP interface, a destination switch will be needed to receive the
encapsulated ERPM packet and locally mirror the whole packet to the Sniffer or a Linux Server.

Decapsulation of ERPM packets at the Destination IP/ Analyzer

ā€¢ In order to achieve the decapsulation of the original payload from the ERPM header. The below two
methods are suggested :
a. Using Network Analyzer
ā€“ Install any well-known Network Packet Analyzer tool which is open source and free to
download.
ā€“ Start capture of ERPM packets on the Sniffer and save it to the trace file (for example :
erpmwithheader.pcap).
Port Monitoring 695