Blog :: Configuration

Cisco Catalyst 9400 NetFlow configuration

scott

I am seeing a lot more of the Cisco Catalyst 9400 switches at my customer sites these days. I have also had a number of requests for configuration help. I figured that I would take this opportunity to walk through the Cisco Catalyst 9400 NetFlow configuration, and provide a sample reference document for you.

Cisco Catalyst 9400 NetFlow configuration

There is not much new here on configuring NetFlow. If you are familiar with the 3850 NetFlow configuration, it is very much the same.

The configurations are unique because there are specific configuration rules that govern the use of particular key (match) parameters, and in which direction we apply the records/monitors to the interfaces.

If you apply a flow monitor in the input direction:

  • Use the match keyword and use the input interface as a key field in an input flow record.
  • Use the collect keyword and use the output interface as a collect field. This field will be present in the exported records, but with a value of “0.”

If you apply a flow monitor in the output direction:

  • Use the match keyword and use the output interface as a key field in an output flow record.
  • Use the collect keyword and use the input interface as a collect field. This field will be present in the exported records, but with a value of “0.”

Let’s get started with the Cisco 9400 NetFlow configuration.

We need to create a separate flow record and flow monitor for inbound traffic and outbound traffic.

Below are two recommended flow records for use in the NetFlow configuration.

flow record FNF-input
     description IPv4 NetFlow
     match ipv4 source address
     match ipv4 destination address
     match transport source-port
     match transport destination-port
     match ipv4 protocol
     match interface input
     match ipv4 tos
     match flow direction

     collect interface output
     collect counter bytes long
     collect counter packets long
     collect transport tcp flags
     collect timestamp absolute first
     collect timestamp absolute last 
flow record FNF-output
     description IPv4 NetFlow
     match ipv4 source address
     match ipv4 destination address
     match transport source-port
     match transport destination-port
     match ipv4 protocol
     match interface output
     match ipv4 tos
     match flow direction

     collect interface input
     collect counter bytes long
     collect counter packets long
     collect transport tcp flags
     collect timestamp absolute first
     collect timestamp absolute last 

The next step creates the exporter. The exporter defines how we export the flows to the collector.

flow exporter Scrutinizer
      description Export to Scrutinizer
      destination [collector's IP address]
      source [name of interface that you will be exporting flows to collector through]
      transport udp 2055
      template data timeout 60 

You must specify a source interface.

If you do not configure a source interface, the exporter will remain disabled.

In the next step, we will create flow monitors. The flow monitors will tie the flow record with the exporter. There will be a flow monitor for each direction.

flow monitor Scrut_mon_input
        description IPv4 FNF ingress exports
        exporter Scrutinizer
        record FNF-input
        cache timeout active 60 
flow monitor Scrut_mon_output
        description IPv4 FNF egress exports
        exporter Scrutinizer
        record FNF-output
        cache timeout active 60 

The last step is to add the flow monitors to the interfaces where you’re looking for traffic visibility.

 interface GigabitEthernet1/0/1
   ip flow monitor Scrut_mon_input input
   ip flow monitor Scrut_mon_output output 

Can I use NetFlow to get layer 2 traffic visibility?

On some Cisco switch models, the answer is YES. You can use a layer-2-switched option on the monitor, or as shown in the example below, configure a unique layer 2 flow monitor on the layer 2 interfaces.

The steps are the same, except that you create a flow record with match statements specific to monitoring layer 2 traffic.

 flow record l2-rec
          description Layer2 NetFlow Record
          match datalink mac source address input
          match datalink mac destination address input
          match datalink vlan input
          match datalink ethertype
          collect counter bytes long
          collect counter packets 

Just like with the layer 3 flow records, we configure a layer 2 output record where the match datalink vlan, match datalink dot1q vlan, and match datalink mac destination address will aggregate on the output direction. A separate outbound monitor needs to be configured to call in these output records.

You need to create a new monitor for each input and output direction that will tie together the layer 2 record and the exporter. We can then configure the layer 2 flow monitors on the layer 2 interfaces.

Configuring Flexible NetFlow offers you a ton of different user configuration options for monitoring, including layer 2 switched traffic streams. Contact us if you want to learn more or need help with configurations.