What to do if you have interfaces reporting over 100% utilization from your Cisco NetFlow collection? Let’s take a look at how we would address this in Scrutinizer NetFlow Analyzer.
The following excerpt is taken from our Frequently Asked Questions:
Q23: Why are my graphs reporting over 100% utilization?
- The interface speed is not correct. Scrutinizer uses the speed specified in the SNMP OID. Click on the speed of the interface to manually type in the correct speed.
- The active timeout has not been set to 1 minute on the router.
- Non-dedicated burstable bandwidth, where the ISP allows you to use over the allocated bandwidth.
- Both ingress and egress NetFlow collection have been enabled on the interface. This can work properly, however NetFlow should be turned off on other interfaces. Scrutinizer works ideal when only ingress NetFlow collection is configured on all interfaces.
- Do you have any encrypted tunnels on the interface?
- 47 – GRE, General Routing Encapsulation.
- 50 – ESP, Encapsulating Security Payload.
- 94 – IP-within-IP Encapsulation Protocol.
- 97 – EtherIP.
- 98 – Encapsulation Header.
- 99 – Any private encryption scheme.
This can cause traffic to be counted twice on an interface.
In today’s blog, I’ll address item #5, including how to exclude encrypted packets in Scrutinizer NetFlow Analyzer and how to determine what other protocols you may want to exclude.
First, to confirm that the above protocols are being excluded in Scrutinizer, go to the Configuration page under the Settings tab.

By default, in version 6.0 and up, we exclude the protocols listed above in the FAQ. They will be entered in the text box with the heading “Exclude IP Types”. This is where you can edit which protocols you will be excluding.
If there are other protocols that you would like to exclude, but are unsure of the exact port used, there is a new gadget in Scrutinizer’s Flow Analytics module called Top Transports. With this gadget, you are given the top protocols used on your network, and the ports used per protocol.

This Top Transport gadget can also provide the conversation data by clicking on the Protocol (IGMP in this example), then click anywhere on the data line as shown below, with results displayed in the last image.

