How to Recognize a Voice Phishing Attempt

Posted in phishing on July 28th, 2016 by Alienor
How to Recognize a Voice Phishing Attempt

Not all phishing attempts come in through your email. Has someone ever called you to offer you a free vacation, or to ask you to participate in a survey, and then asked you for sensitive information? They were attempting voice phishing, sometimes called “vishing.”

Read more »

Tags: ,

Cisco ASA NetFlow Configuration using ASDM

Posted in Netflow Traffic Analysis on July 27th, 2016 by Scottr
Cisco ASA NetFlow Configuration using ASDM

Over the past few weeks I have taken a number of support calls from customers who were looking for some assistance with their Cisco ASA NetFlow configuration using ASDM. So I figured that I would take this opportunity to write a blog walking through the configuration steps  to supplement the existing blogs that show a video or have a series of images.

In my opinion, the easiest way to get NSEL exporting from these security appliances is through the use of the ASDM interface. This simple, GUI-based firewall management tool allows you to quickly configure the Cisco ASA without having to use the cumbersome command-line interface. Although I must admit that configuring the Cisco ASA using the CLI is really not that much different that configuring NetFlow on any other router or switch.

So let’s walk through the steps to Enable NetFlow using ASDM Read more »

Scott Robertson
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!



Tags: , ,

Cisco NBAR Best Practices for Custom Protocol Reporting

Posted in cisco nbar on July 25th, 2016 by James Lawrence
Cisco NBAR Best Practices for Custom Protocol Reporting

As a company reporting on just about all unique flow exports found in the world, we run into nearly every issue probably thought possible.  From problems with active timeout to long lived flows, we work with different companies to try and make sure all the data can work together.  To this end, we like to think that we promote the best practices that our team has collected over the years from being in this business.

Read more »

Tags:

APCON Netflow Support

Posted in Advanced NetFlow Reporting, Cisco NetFlow, Network traffic monitoring on July 20th, 2016 by Jennifer Maher
APCON Netflow Support

Recently some customers questioned if we provide APCON netflow support. APCON, a company headquartered near Portland, OR, develops innovative, scalable technology solutions to enhance network monitoring, support IT traffic analysis, and streamline IT network management and security. They saw that NetFlow is traditionally generated by routers and switches at key locations across the network. There are disadvantages to this approach, however, including the performance impact on key production network routers/switches, the use of network bandwidth to transmit NetFlow records, and the added complexity of collecting records from many sources across the network. Read more »

Tags: , ,

Find Pokemon GO Network Traffic with NetFlow

Posted in application aware netflow, NetFlow, netflow probe, Network Traffic Analysis on July 19th, 2016 by Jarryd
Find Pokemon GO Network Traffic with NetFlow

Monitor Pokemon Go Network Traffic

So there I am monitoring my network with NetFlow and a wild application appears! Pokemon GO hit the scene last week and it’s quickly becoming one of the most popular applications to hit networks. Most network professionals are interested in seeing what applications are in their environment and who is using them. In the spirit of catching them all, I set out to find Pokemon GO network traffic with NetFlow.

 

Read more »

Jarryd Boyd

Sales Engineer

Tags: , ,