Q: What is a Cisco Borderless Network?

A: The Cisco Secure Borderless Network architecture integrates security into the distributed network and enables customers to build flexible solutions to meet evolving business and security challenges. Think about mobile phones for a minute, is your network securing them or secure from them? Cisco Borderless Networks claim to deliver the new workspace experience, connecting anyone, anywhere, using any device, to any resource – securely, reliably, seemlessly. Watch a few Cisco Customers explain it. In truth, most of us already have a borderless network in place. Can you VPN into the business network from home? That would be one example.

borderless networks

Q: What does plixer have to do with Borderless Networking?

A: This is a great question, here are a few examples that all involve NetFlow.

  1. Support for MAC Address reporting. This works great on hand held devices (i.e. smart phones). We can also report on VLANs.
  2. Support for Flexible NetFlow. Companies setting up IPSec tunnels for VPN connectivity will run into problems seeing the flows if they are exporting NetFlow v5. Sending NetFlow over IPsec Tunnels requires Flexible NetFlow and we support it.
  3. Support for NetFlow option templates so that SNMP is not required to gather interface names and speed. Many feel that SNMP is not secure. We give you the option.
  4. Support for NetFlow from the Cisco ASA Security Appliance which exports messages in NetFlow datagrams.
  5. Support for Cisco Medianet Network Performance Monitoring so that remote offices engaged in VoIP connections can be confident that their quality of service (e.g. excessive jitter or packet loss) is being constantly monitored. We also provide reports for identifying DSCP issues in the DiffServ domain.
  6. Support for Network Behavior Analysis where all flows from all devices are constantly monitored for strange communication patterns. Ultimately this could lead to alarms or even proactive action such as turning a port off or throttling bandwidth via ACL entries.
  7. Support for User Name reporting on NetFlow exports so that the actual authentication name is identified and not just the computer hosting the session.
  8. Support for NetFlow NBAR which is far superior to SNMP NBAR for deep packet inspection. This technology for example helps identify all the different applications using TCP port 80. A NetFlow Analyzer that states HTTP for all TCP port 80 traffic is often not accurate.
  9. Support for LDAP and SSL which enables network administrators to securely login to Scrutinizer remotely.
  10. Support for access to the raw flows as they come into our NetFlow collector. Our web interface displays all of the columns exported in the template. If for example you’re experimenting with exporting VRF information, we can display it and if you call us, we can build a custom report within a few hours.

We wouldn’t want anyone to think that NetFlow isn’t part of Borderless Networking. Please call us with any questions.

Mike Patterson author pic


Michael is one of the Co-founders and the former product manager for Scrutinizer. He enjoys many outdoor winter sports and often takes videos when he is snowmobiling, ice fishing or sledding with his kids. Cold weather and lots of snow make the best winters as far as he is concerned. Prior to starting Somix and Plixer, Mike worked in technical support at Cabletron Systems, acquired his Novell CNE and then moved to the training department for a few years. While in training he finished his Masters in Computer Information Systems from Southern New Hampshire University and then left technical training to pursue a new skill set in Professional Services. In 1998 he left the 'Tron' to start Somix which later became Plixer.


Big Data

Sankey Flow Graph

One of the greatest benefits of NetFlow collection for traffic analysis, is we’re provided with the ability to visualize the…

Leave a Reply