All NetFlow
AdobeStock scaled

What visibility flow data offer

Network and Security administrators have several monitoring protocols available to help provide network insight and security awareness. Today, I’d like to talk about why flow...

jeffm

Inspecting encrypted traffic with JA3 and JA3S fingerprinting

Two years ago, I wrote a blog about tracking malware in encrypted traffic. The overall theme of that blog was that encryption has become...

annam

How to configure Viptela IPFIX exports

One of the perks of working in technical support is learning something new every day. For instance, just earlier today I was on a...

jeff

Cisco ASR 1001-X overloading QFP

Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata into at least one...

feature image

Flow protocols in real-world environments

Over the years, libraries have been filled on the topic of flow protocols—specifically, how they work and their general accuracy....

jeff

Scrutinizer and Its RESTful API

I spend a large amount of time day-to-day working with customers to understand how they can best leverage their current NetFlow/IPFIX data to solve...

jeff

Cisco Catalyst 9500 Flexible NetFlow Configuration

Recently I’ve had many requests from customers who upgraded to the Catalyst 9500 series and are looking for a NetFlow configuration document. So I’ve...

jeff

Scrutinizer SaaS Deployment

Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud over the last few years,...

traci

Extreme NetFlow Configuration for S-Series, N-Series, and K-Series

We’ve seen a lot of coverage regarding the growth of Extreme Networks lately. Between their recent acquisition of Brocade and Avaya, it would appear...