All

sFlow Autonomous Systems Report

With the new sFlow Autonomous Systems report your flow analyzer can now support AS reporting for sFlow and most other IP flow format. The NetFlow analyzer...

Three Mistakes When Performing Cyber Threat Detection

We are very busy this week getting ready for CiscoLive! 2013 in Orlando next week.  Since we have a first rate team getting us...

Plixer at CiscoLive! Universal Studios in Orlando

It’s that time again, CiscoLive! 2013 is upon us! Plixer’s NetFlow Knights will be attending the annual event next week in Orlando. We are...

Cisco ASA NetFlow: Bidirectional Support Added

If you were waiting to upgrade from ASA 8.4(5), because you would lose bidirectional flow exports, then wait no more. Cisco ASA NetFlow Bidirectional...

Cisco 2960-X NetFlow-Lite Configuration

I have two goals with this post, the first is to announce that you can sign up for the joint webcast we are hosting...

Cisco NetFlow | Part 2 – What is Flow Analytics™?

In this blog, I will be continuing Part 1 of the “What is Flow Analytics™?” Series. In this blog I will be going over what...

What is a Security Threat: DNS Reflection Attack

What is a security threat? A network security threat is any unwanted traffic trying to get onto your network or cause harm to it....

Enabling NetFlow on a vSwitch

With the increasing popularity of vSwitches; some of you may be asking “how do I go about enabling NetFlow / IPFIX in a virtual...

Username NetFlow Reporting

Username NetFlow Reporting is a hot topic since the Cisco Visual Networking Index (VNI) report in late May. By 2016, Cisco’s forecast predicts that there...