One of the greatest benefits of NetFlow collection for traffic analysis, is we’re provided with the ability to visualize the flow of our network traffic. This is a huge improvement over the traditional method of parsing row after row of big data in a structured table format. As the IoT becomes a reality and traffic volume continues to grow at a consistent rate, we need a way of visualizing this traffic. While we’re provided many graph types that help to convey information through colors, size or position, Plixer is excited to announce the inclusion of its latest graph type, the Sankey Flow Graph!
Category: NetFlow
NetFlow Vs. Packet Capture
Until the introduction of flow technologies like NetFlow and the standard called IPFIX, companies relied largely on two technologies. The first was SNMP which allowed customers to trend different performance metrics for long periods of time. Metrics included interface utilization, interface errors, CPU, memory and much more. The problem with SNMP however, is that it couldn’t provide details on who and what was causing the traffic, making it nearly useless for isolating network performance problems and investigating security issues. An extension to SNMP called RMON was incorporated into SNMP but, it failed for several reasons.
Viavi Observer GigaStor NetFlow Support
One of the things that I really like about my position as a Technical Support Representative is that I often work with customers who show me NetFlow configurations on vendor devices that I didn’t know support NetFlow as a monitoring protocol. Plixer’s NetFlow collector has seen it all and helping other vendors without a doubt keeps us on our toes. Last week I had the opportunity to work with a customer who wanted to get more visibility out of his Viavi Observer GigaStor deployment.
Find Pokemon GO Network Traffic with NetFlow
Monitor Pokemon Go Network Traffic
So there I am monitoring my network with NetFlow and a wild application appears! Pokemon GO hit the scene last week and it’s quickly becoming one of the most popular applications to hit networks. Most network professionals are interested in seeing what applications are in their environment and who is using them. In the spirit of catching them all, I set out to find Pokemon GO network traffic with NetFlow.
Use Your Surveillance Cameras to Investigate Malware
If you suspect a malware breach and want to investigate the history of a specific host, how do you do it? For most of us, the turn-to technology when needing to forensically investigate nearly any type of network related traffic pattern is NetFlow or IPFIX. All major routers on the market today support one or both of these flow protocols.