The Site to Site option under IP Groups in Manage Engine NetFlow Analyzer lets you monitor traffic between two specific sites based on IP Address or IP Network. Please watch the video given below to know more about the same. You can also go through the blog about the Site to Site monitoring from here .
Flexible NetFlow configuration in Cisco 4500 with Supervisor Engine 7-E and Cisco IOS XE
Catalyst 4500 series switches with Supervisor Engine 7-E and Cisco IOS XE Software Release 3.1.0 SG supports Flexible NetFlow. Hence we thought of sharing the configuration information with you. The configuration of Flexible NetFlow in these switches is similar to the other regular Flexible NetFlow .
Application monitoring in NetFlow Analyzer – a video tutorial
NetFlow Analyzer is a bandwidth monitoring tool which helps you make an in-depth analysis about your network traffic. However, NetFlow Analyzer can also be used for application monitoring. Please view the video to know more: You can download the 30 day trial of ManageEngine NetFlow Analyzer from here
NetFlow configuration for Vyatta router
One of our customers wanted to know the configuration for NetFlow for the Vyatta router. For the benefit of many others who may need it, here it is: Please configure NetFlow on your Vyatta router as mentioned below: set system flow-accounting interface // This command should be issued for each interface you want to monitor set system flow-accounting netflow server port 9996 // Specifies a NetFlow collector to which to export Netflow data set system flow-accounting netflow sampling-rate rate // Specifies the rate at which packets are sampled for statistics. set system flow-accounting netflow version 9 // Specifies the Netflow format that data will be exported in
Customizing ASAM module in NetFlow Analyzer
The previous blog was on ASAM will have given you an idea about the class “Scan and Probes” available with NetFlow Analyzer. Now that we know how the events are triggered we need to narrow it down, that the specific events or unwanted events can be ignored. When I say unwanted events, I mean the events that are deemed trusted or allowed network activities for certain resources and problems
Taking the Advanced Security Analytics to the next level
Our previous blog on advanced security analytics module would have given you a general idea of what ASAM does? Pre-requisites for ASAM module and more