Arista sFlow Configuration

Posted in sFlow on July 2nd, 2015 by Austin
Arista sFlow Configuration

Lately I’ve spoken to a few people in the field that are using Arista switches to get visibility into their networks using sFlow and thought I would write about Arista sFlow configuration.  Arista switches offer a single sFlow agent that samples ingress traffic from all Ethernet as well as port channel interfaces. At Plixer we see more and more companies who are looking to utilize flow collection to identify bandwidth issues and network security risks. Read more »

Austin
Tags: , ,

NetFlow Directionality Support : Part 2

Posted in detect network threats, detecting malware on July 2nd, 2015 by mike@plixer.com
NetFlow Directionality Support : Part 2

This is a continuation of Flow Directionality Support : Part 1 which should be read first.

My guess is that a flow collector vendor claiming to determine flow or NetFlow direction makes an educated guess from NetFlow v5 traffic on who initiated the connection using flow start times (using a single exporter so timestamps are relative), packet counts, and port numbers. The trouble is, finding the true relationship between two hosts is very difficult when you connect through an intermediate node or nodes where traffic is encrypted. Read more »

Michael Patterson
Founder and CEO

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: ,

IWAN NetFlow Support

Posted in performance routing on June 30th, 2015 by Justin
IWAN NetFlow Support

For a while now we have had IWAN NetFlow support built into our network incident response system, which collects and reports on NetFlow, IPFIX, sFlow, and all other flow derivatives.  IWAN stands for Intelligent WAN and promises intelligent path control, application optimization, and secure connectivity to the Internet and branch locations while reducing the operating cost of the WAN. Read more »

Justin
Marketing Manager

Tags: , ,

Responding to zero day threats using NetFlow

Posted in network threat detection, Security, threat detection on June 29th, 2015 by Jake
Responding to zero day threats using NetFlow

In this blog, I want to talk to you about investigating zero-day attacks. A zero-day attack can be a huge menace on the network, since it can bypass a lot of your detection systems that currently have in place. It can also go unnoticed on the network for a very long time. Read more »

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: ,

Understanding Netflow Traffic Volume

Posted in NetFlow, Network Monitoring, SNMP on June 18th, 2015 by Jarryd
Understanding Netflow Traffic Volume

Seeing how much traffic is going over an interface is an integral part of every network professional’s daily routine. This information can be used for everything from future planning to trouble-shooting. That’s why understanding NetFlow traffic volume and knowing exactly how much bandwidth is being used at any given time is critical.

Read more »