CMMC Practice SC.5.198
Configure monitoring systems to record packets passing through the organization's Internet network boundaries and other organizational-defined boundaries.
Bold Coast Security Guidance
Though there are simple ways to capture packets of data over a period of time, this practice specifically addresses and very high-level of maturity in the science of data management. For Level 5 compliance there must be a specialized function with a high-degree of automation in place, and a risk to the organization that would require storing months of packet-level information coming into and going out of an organization's network boundaries. Depending on the size of the organization, this particular level of control would require dedicated personnel or a very close third-party managed services provider relationship.
CIS CONTROLS V7.1
Configure monitoring systems to record network packets passing through the boundary at each of the organization’s network boundaries.