All

Where’s the Security Camera when you need it?

Wouldn’t performing a Network Threat Investigation be easier if you had a network traffic security camera on every router and switch? You’re in luck....

Create Network Monitoring Reports with Scrutinizer

One of the most common support requests that I get each day is, “how can I create network monitoring reports?” This article will focus...

Exporting Server Statistics with IPFIX

There has been much hype concerning IPFIX since it was finally given the title as an IETF standard last month; if you want to read up...

NetFlow Direction and it’s Value to Troubleshooting

Determining NetFlow Direction is the process of trying to ascertain who initiated a flow.  Although “NetFlow Direction” is the title of this post, the...

VDS NetFlow Support

I was chasing down a Virtual Distributed Switch NetFlow support question the other day because a customer was wondering how our NetFlow Analyzer would handle...

Palo Alto Networks: NetFlow Reports

Palo Alto Networks next-generation firewalls provide NetFlow reports that enable IT organizations to monitor network access by easily identifying and trend the type of...

IT Security Forensics: Network Behavior Analysis

Today, many IDS, IPS, and IT Security Forensics vendors purport that most threats are best combated using their Signature-based solutions. Well ‘best’ may be...

Distributed view of Application Performance Monitoring

A Distributed view of Application Performance Monitoring doesn’t have to be an expensive endeavor.  There are ways, on most networks deployed today, to gain...

Cisco WLC NetFlow Configuration

Instructions for the Cisco WLC NetFlow configuration can be found in the Cisco Wireless LAN Controller Configuration Guide, Release 7.4, page 130.   The NetFlow...