Documente Academic
Documente Profesional
Documente Cultură
Configuration Guide
Release 12.4T
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public
domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo, DCE, and Welcome to the Human Network
are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To
You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,
Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing,
FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet,
Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc.
and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0809R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco IOS Flexible NetFlow Configuration Guide
2008 Cisco Systems, Inc. All rights reserved.
This document describes the objectives, audience, conventions, and organization used in Cisco IOS and
Cisco IOS XE software documentation, collectively referred to in this document as Cisco IOS
documentation. Also included are resources for obtaining technical assistance, additional
documentation, and other information from Cisco. This document is organized into the following
sections:
Audience, page i
Documentation Objectives
Cisco IOS documentation describes the tasks and commands available to configure and maintain Cisco
networking devices.
Audience
The Cisco IOS documentation set is i ntended for users who configure and maintain Cisco networking
devices (such as routers and switches) but who may not be familiar with the configuration and
maintenance tasks, the relationship among tasks, or the Cisco IOS commands necessary to perform
particular tasks. The Cisco IOS documentation set is also intended for those users experienced with
Cisco IOS who need to know about new features, new configuration options, and new software
characteristics in the current Cisco IOS release.
Documentation Conventions
In Cisco IOS documentation, the term router may be used to refer to various Cisco products; for example,
routers, access servers, and switches. These and other networking devices that support Cisco IOS
software are shown interchangeably in examples and are used only for illustrative purposes. An example
that shows one product does not necessarily mean that other products are not supported.
This section includes the following topics:
Typographic Conventions
Cisco IOS documentation uses the following typographic conventions:
Convention
Description
^ or Ctrl
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the
Control key while you press the D key. (Keys are indicated in capital letters but
are not case sensitive.)
string
ii
Convention
Description
bold
Bold text indicates commands and keywords that you enter as shown.
italic
[x]
[x | y]
{x | y}
[x {y | z}]
Braces and a pipe within square brackets indicate a required choice within an
optional element.
Software Conventions
Cisco IOS uses the following program code conventions:
Convention
Description
Courier font
Bold Courier font indicates text that the user must enter.
<
>
Angle brackets enclose text that is not displayed, such as a password. Angle
brackets also are used in contexts in which the italic font style is not supported;
for example, ASCII text.
An exclamation point at the beginning of a line indicates that the text that follows
is a comment, not a line of code. An exclamation point is also displayed by
Cisco IOS software for certain processes.
Caution
Note
Timesaver
Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Means the described action saves time. You can save time by performing the action described in the
paragraph.
Documentation Organization
This section describes the Cisco IOS documentation set, how it is organized, and how to access it on
Cisco.com. Included are lists of configuration guides, command references, and supplementary
references and resources that make up the documentation set. The following topics are included:
iii
Release notes and caveats provide information about platform, technology, and feature support for
a release and describe severity 1 (catastrophic), severity 2 (severe), and severity 3 (moderate) defects
in released Cisco IOS code. Review release notes before other documents to learn whether or not
updates have been made to a feature.
Sets of configuration guides and command references organized by technology and published for
each standard Cisco IOS release.
Configuration guidesCompilations of documents that provide informational and
about the commands used in the Cisco IOS features and processes that make up the related
configuration guides. For each technology, there is a single command reference that covers all
Cisco IOS releases and that is updated at each standard release.
Lists of all the commands in a specific release and all commands that are new, modified, removed,
or replaced in the release.
Command reference book for debug commands. Command pages are listed in alphabetical order.
Reference book for system messages for all Cisco IOS releases.
The New Features List for each release provides a list of all features in the release with hyperlinks to the
feature guides in which they are documented.
Feature Guides
Cisco IOS features are documented in feature guides. Feature guides describe one feature or a group of
related features that are supported on many different software releases and platforms. Your Cisco IOS
software release or platform may not support all the features documented in a feature guide. See the
Feature Information table at the end of the feature guide for information about which features in that
guide are supported in your software release.
Configuration Guides
Configuration guides are provided by technology and release and comprise a set of individual feature
guides relevant to the release and technology.
iv
Command References
Command reference books describe Cisco IOS commands that are supported in many different software
releases and on many different platforms. The books are provided by technology. For information about
all Cisco IOS commands, use the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup
or the Cisco IOS Master Command List, All Releases, at
http://www.cisco.com/en/US/docs/ios/mcl/all_release/all_mcl.html.
Cisco IOS Supplementary Documents and Resources
Cisco IOS and Cisco IOS XE Configuration Guides and Command References
Features/Protocols/Technologies
AppleTalk protocol.
Table 1
Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
Features/Protocols/Technologies
DECnet protocol.
vi
Table 1
Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
Features/Protocols/Technologies
vii
Table 1
Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
Features/Protocols/Technologies
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/
guide/ip6-roadmap.html
viii
Table 1
Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
Features/Protocols/Technologies
ix
Table 1
Cisco IOS and Cisco IOS XE Configuration Guides and Command References (continued)
Features/Protocols/Technologies
Cisco IOS Service Selection Gateway Configuration Guide Subscriber authentication, service access, and accounting.
Cisco IOS Service Selection Gateway Command Reference
Cisco IOS Software Activation Configuration Guide
Cisco IOS Software Activation Command Reference
Cisco IOS Software Modularity Installation and
Configuration Guide
Cisco IOS Software Modularity Command Reference
Cisco IOS Terminal Services Configuration Guide
Cisco IOS Terminal Services Command Reference
Table 2
Document Title
Description
MIBs
RFCs
Technical documentation
Technical assistance
Cisco IOS technical documentation includes embedded feedback forms where you can rate documents
and provide suggestions for improvement. Your feedback helps us improve our documentation.
xi
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the
Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar,
Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration
Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and
the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
20072008 Cisco Systems, Inc. All rights reserved.
xii
This document provides basic information about the command-line interface (CLI) in Cisco IOS and
Cisco IOS XE software and how you can use some of the CLI features. This document contains the
following sections:
For more information about using the CLI, see the Using the Cisco IOS Command-Line Interface
section of the Cisco IOS Configuration Fundamentals Configuration Guide.
For information about the software documentation set, see the About Cisco IOS and Cisco IOS XE
Software Documentation document.
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
There are only two changes that you can make to a console port and an AUX port:
Note
Change the port speed with the config-register 0x command. Changing the port speed is not
recommended. The well-known default speed is 9600.
Change the behavior of the port; for example, by adding a password or changing the timeout value.
The AUX port on the Route Processor (RP) installed in a Cisco ASR1000 series router does not serve
any useful customer purpose and should be accessed only under the advisement of a customer support
representative.
ii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Table 1
Command
Mode
Access Method
Prompt
Exit Method
User EXEC
Log in.
Router>
Privileged
EXEC
Router#
Mode Usage
Change terminal
settings.
Manage device
configuration files.
Global
configuration
Router(config)#
Interface
configuration
From global
configuration mode,
issue the interface
command.
Router(config-if)#
Line
configuration
iii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Table 1
Command
Mode
Access Method
Prompt
Exit Method
ROM monitor
rommon # >
Diagnostic
(available only
on the Cisco
ASR1000
series router)
Router(diag)#
The router boots or
enters diagnostic mode
in the following
scenarios. When a
Cisco IOS process or
processes fail, in most
scenarios the router will
reload.
iv
The # symbol
represents the line
number and increments
at each prompt.
A user-configured
access policy was
configured using
the transport-map
command, which
directed the user
into diagnostic
mode.
The router was
accessed using an
RP auxiliary port.
A break signal
(Ctrl-C,
Ctrl-Shift-6, or the
send break
command) was
entered, and the
router was
configured to enter
diagnostic mode
when the break
signal was received.
Mode Usage
Perform password
recovery when a
CTRL-Break sequence is
issued within 60 seconds
of a power-on or reload
event.
Provide methods of
restarting the Cisco IOS
software or other
processes.
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
EXEC commands are not saved when the software reboots. Commands that you issue in a configuration
mode can be saved to the startup configuration. If you save the running configuration to the startup
configuration, these commands will execute when the software is rebooted. Global configuration mode
is the highest level of configuration mode. From global configuration mode, you can enter a variety of
other configuration modes, including protocol-specific modes.
ROM monitor mode is a separate mode that is used when the software cannot load properly. If a valid
software image is not found when the software boots or if the configuration file is corrupted at startup,
the software might enter ROM monitor mode. Use the question symbol (?) to view the commands that
you can use while the device is in ROM monitor mode.
rommon 1 > ?
alias
boot
confreg
cont
context
cookie
.
.
.
rommon 2 >
The following example shows how the command prompt changes to indicate a different command mode:
Router> enable
Router# configure terminal
Router(config)# interface ethernet 1/1
Router(config-if)# ethernet
Router(config-line)# exit
Router(config)# end
Router#
Note
Command
Purpose
help
partial command?
Provides a list of commands that begin with the character string (no
space between the command and the question mark).
partial command<Tab>
command ?
command keyword ?
Lists the arguments that are associated with the keyword (space between
the keyword and the question mark).
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
?
Router# ?
Exec commands:
access-enable
access-profile
access-template
alps
archive
<snip>
partial command?
Router(config)# zo?
zone zone-pair
partial command<Tab>
Router(config)# we<Tab> webvpn
command ?
Router(config-if)# pppoe ?
enable
Enable pppoe
max-sessions Maximum PPPOE sessions
command keyword ?
Router(config-if)# pppoe enable ?
group attach a BBA group
<cr>
vi
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Table 3
Symbol/Text
Function
Notes
A.B.C.D.
vii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
enable password
Using an enable secret password is recommended because it is encrypted and more secure than the
enable password. When you use an enable secret password, text is encrypted (unreadable) before it is
written to the config.text file. When you use an enable password, the text is written as entered (readable)
to the config.text file.
Each type of password is case sensitive, can contain from 1 to 25 uppercase and lowercase alphanumeric
characters, and can start with a number. Spaces are also valid password characters; for example,
two words is a valid password. Leading spaces are ignored, but trailing spaces are recognized.
Note
Both password commands have numeric keywords that are single integer values. If you choose a number
for the first character of your password followed by a space, the system will read the number as if it were
the numeric keyword and not as part of your password.
When both passwords are set, the enable secret password takes precedence over the enable password.
To remove a password, use the no form of the commands: no enable password or
no enable secret password.
For more information about password recovery procedures for Cisco products, see
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/
products_tech_note09186a00801746e6.shtml.
A command history buffer is also available in line configuration mode with the same default and
configuration options. To set the command history buffer size for a terminal session in line configuration
mode, issue the history command:
Router(config-line)# history [size num]
To recall commands from the history buffer, use the following methods:
viii
Press Ctrl-P or the up arrow keyRecalls commands beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
Press Ctrl-N or the down arrow keyRecalls the most recent commands in the history buffer after
they have been recalled using Ctrl-P or the up arrow key. Repeat the key sequence to recall
successively more recent commands.
Note
The arrow keys function only on ANSI-compatible terminals such as the VT100.
Issue the show history command in user EXEC or privileged EXEC modeLists the most recent
commands that you entered. The number of commands that are displayed is determined by the
setting of the terminal history size and history commands.
The CLI command history feature is enabled by default. To disable this feature for a terminal
session, issue the terminal no history command in user EXEC or privileged EXEC mode or the
no history command in line configuration mode.
Abbreviating Commands
Typing a complete command name is not always required for the command to execute. The CLI
recognizes an abbreviated command when the abbreviation contains enough characters to uniquely
identify the command. For example, the show version command can be abbreviated as sh ver. It cannot
be abbreviated as s ver because s could mean show, set, or systat. The sh v abbreviation also is not valid
because the show command has vrrp as a keyword in addition to version. (Command and keyword
examples from Cisco IOS Release 12.4(13)T.)
Command Alias
Original Command
help
lo
logout
ping
show
u or un
undebug
where
To create a command alias, issue the alias command in global configuration mode. The syntax of the
command is alias mode command-alias original-command. Following are some examples:
ix
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
To view both default and user-created aliases, issue the show alias command.
For more information about the alias command, see
http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html.
Caution
Debugging is a high priority and high CPU utilization process that can render your device unusable. Use
debug commands only to troubleshoot specific problems. The best times to run debugging are during
periods of low network traffic and when few users are interacting with the network. Debugging during
these periods decreases the likelihood that the debug command processing overhead will affect network
performance or user access or response times.
begin regular expressionDisplays the first line in which a match of the regular expression is found
and all lines that follow.
include regular expressionDisplays all lines in which a match of the regular expression is found.
exclude regular expressionDisplays all lines except those in which a match of the regular
expression is found.
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Using the CLI
To use one of these output modifiers, type the command followed by the pipe symbol (|), the modifier,
and the regular expression that you want to search for or filter. A regular expression is a case-sensitive
alphanumeric pattern. It can be a single character or number, a phrase, or a more complex string.
The following example illustrates how to filter output of the show interface command to display only
lines that include the expression protocol.
Router# show interface | include protocol
FastEthernet0/0 is up, line protocol is up
Serial4/0 is up, line protocol is up
Serial4/1 is up, line protocol is up
Serial4/2 is administratively down, line protocol is down
Serial4/3 is administratively down, line protocol is down
Error Message
Meaning
% Ambiguous command:
show con
% Incomplete command.
xi
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Saving Changes to a Configuration
You press Enter to accept the startup-config filename (the default), or type a new filename and then press
Enter to accept that name. The following output is displayed indicating that the configuration was saved:
Building configuration...
[OK]
Router#
On most platforms, the configuration is saved to NVRAM. On platforms with a Class A flash file system,
the configuration is saved to the location specified by the CONFIG_FILE environment variable. The
CONFIG_FILE variable defaults to NVRAM.
Additional Information
Software Download Center (downloads; tools; licensing, registration, advisory, and general
information) (requires Cisco.com User ID and password)
http://www.cisco.com/kobayashi/sw-center/
Error Message Decoder, a tool to help you research and resolve error messages for
Cisco IOS software
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
xii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Additional Information
Command Lookup Tool, a tool to help you find detailed descriptions of Cisco IOS commands
(requires Cisco.com user ID and password)
http://tools.cisco.com/Support/CLILookup
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the
Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar,
Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration
Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone,
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect,
ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and
the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
20072008 Cisco Systems, Inc. All rights reserved.
xiii
Using the Command-Line Interface in Cisco IOS and Cisco IOS XE Software
Additional Information
xiv
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router.
NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides network
and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
This module provides an overview of Flexible NetFlow and the advanced Flexible NetFlow features and
services.
Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS
software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An
account on Cisco.com is not required.
Contents
Flows, page 3
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Application monitoring and profiling. NetFlow data enables network managers to gain a detailed
time-based view of application usage over the network. This information is used to plan, understand
new services, and allocate network and application resources (for example, web server sizing and
voice over IP (VoIP) deployment) to meet customer demands responsively.
User monitoring and profiling. NetFlow data enables network engineers to gain detailed
understanding of customer and user use of network and application resources. This information may
then be used to efficiently plan and allocate access, backbone, and application resources and to
detect and resolve potential security and policy violations.
Network planning. NetFlow can be used to capture data over a long period of time, affording the
opportunity to track and anticipate network growth and plan upgrades to increase the number of
routing devices, ports, and higher-bandwidth interfaces. NetFlow services data optimizes network
planning for peering, backbone upgrades, and routing policy. NetFlow helps to minimize the total
cost of network operations while maximizing network performance, capacity, and reliability.
NetFlow detects unwanted WAN traffic, validates bandwidth and quality of service (QoS), and
allows the analysis of new network applications. NetFlow will give you valuable information to
reduce the cost of operating your network.
Security analysis. NetFlow identifies and classifies distributed denial of service (dDoS) attacks,
viruses, and worms in real time. Changes in network behavior indicate anomalies that are clearly
demonstrated in Flexible NetFlow data. The data is also a valuable forensic tool to understand and
replay the history of security incidents.
Billing and accounting. NetFlow data provides fine-grained metering (for instance, flow data
includes details such as IP addresses, packet and byte counts, time stamps, type of service (ToS) and
application ports) for highly flexible and detailed resource utilization accounting. Service providers
may use the information for billing based on time of day, bandwidth usage, application usage,
quality of service, and so on. Enterprise customers may use the information for departmental charge
back or cost allocation for resource utilization.
NetFlow data warehousing and data mining. NetFlow data (or derived information) can be
warehoused for later retrieval and analysis in support of proactive marketing and customer service
programs (for example, figuring out which applications and services are being used by internal and
external users and targeting them for improved service, advertising, and so on). In addition, Flexible
NetFlow data gives market researchers access to the who, what, where, and how long
information relevant to enterprises and service providers.
Flows
Original NetFlow and Flexible NetFlow both use the concept of flows. A flow is defined as a stream of
packets between a given source and a given destination.
Original NetFlow and Flexible NetFlow both use the values in key fields in IP datagrams, such as the IP
source or destination address and the source or destination transport protocol port, as the criteria for
determining when a new flow must be created in the cache while network traffic is being monitored.
When the value of the data in the key field of a datagram is unique with respect to the flows that already
exist, a new flow is created.
Original NetFlow and Flexible NetFlow both use non-key fields as the criteria for identifying fields from
which data is captured from the flows. The flows are populated with data that is captured from the values
in the non-key fields.
Figure 1 is an example of the process for inspecting packets and creating flow records in the cache. In
this example, two unique flows are created in the cache because there are different values in the source
and destination IP address key fields.
Figure 1
Packet Inspection
P2
Example 1
Example 2
P1
P2
P1
Inspect Packet
Inspect Packet
Key Fields
Packet 1
Key Fields
Packet 1
Source IP
10.1.1.1
Source IP
10.1.1.1
Destination IP
10.9.7.2
Destination IP
10.9.7.2
Source port
23
Source port
23
Destination port
22078
Destination port
22078
Layer 3 Protocol
TCP-6
Layer 3 Protocol
TCP-6
TOS Byte
TOS Byte
Input Interface
Ethernet 0
Input Interface
Ethernet 0
... Pkts
Source IP Dest. IP
... Pkts
10.1.1.1
E1
... 11000
10.3.3.3
10.2.7.2
E1
... 11000
10.1.1.1
10.9.7.2
E1
... 11000
10.9.7.2
Enhanced flow infrastructure for security monitoring and distributed DoS detection and
identification.
New information from packets to adapt flow information to a particular service or operation in the
network. The flow information available will be customizable by Flexible NetFlow users.
Extensive use of Ciscos flexible and extensible NetFlow Version 9 export format.
A comprehensive IP accounting feature that can be used to replace many accounting features, such
as IP accounting, BGP Policy Accounting, and persistent caches.
Original NetFlow allows you to understand what the network is doing and thus to optimize network
design and reduce operational costs. Flexible NetFlow allows you to understand network behavior with
more efficiency, with specific flow information tailored for various services used in the network. The
following are some example applications for a Flexible NetFlow feature:
Flexible NetFlow enhances Cisco NetFlow as a security monitoring tool. For instance, new flow
keys can be defined for packet length or MAC address, allowing users to search for a specific type
of attack in the network.
Flexible NetFlow allows you to quickly identify how much application traffic is being sent between
hosts by specifically tracking TCP or user datagram protocol (UDP) applications by the class of
service (CoS) in the packets.
The accounting of traffic entering a multi-protocol label switching (MPLS) or IP core network and
its destination for each next hop per class of service. This capability allows the building of an
edge-to-edge traffic matrix.
ISP
Peering Flows
Dest. AS
Dest. Traffic Index
BGP Next Hop
DSCP
IP
IP
Branch
Data Center
WAN
Multicast Flows
Protocol
Ports
IP Address
TCP Flags
Packet Section
Security Flows
Protocol
Ports
IP Address
TCP Flags
Packet Section
IP Flows
IP Subnets
Ports
Protocol
Interfaces
Egress/Ingress
271759
IP
Campus
Records, page 5
Records
In Flexible NetFlow a combination of key and non-key fields is called a record. Flexible NetFlow records
are assigned to Flexible NetFlow flow monitors to define the cache that is used for storing flow data.
Flexible NetFlow includes several predefined records that can help you get started using Flexible
NetFlow. To use Flexible NetFlow to its fullest potential, you need to create your own customized
records.
1. The Netflow Original and NetFlow IPv4/IPv6 original-input predefined records are functionally
equivalent.
If you want to learn more about the Flexible NetFlow predefined records, refer to the Getting Started
with Configuring Cisco IOS Flexible NetFlow module or the Configuring Cisco IOS Flexible NetFlow
with Predefined Records module.
User-Defined Records
Flexible NetFlow enables you to define your own records for a Flexible NetFlow flow monitor cache by
specifying the key and non-key fields to customize the data collection to your specific requirements.
When you define your own records for a Flexible NetFlow flow monitor cache, they are referred to as
user-defined records. The values in non-key fields are added to flows to provide additional information
about the traffic in the flows. A change in the value of a non-key field does not create a new flow. In most
cases the values for non-key fields are taken from only the first packet in the flow. Flexible NetFlow
enables you to capture counter values such as the number of bytes and packets in a flow as non-key fields.
You can create user-defined records for applications such as QoS and bandwidth monitoring, application
and end user traffic profiling, and security monitoring for denial of service (DoS) attacks. Flexible
NetFlow also includes several predefined records that emulate original NetFlow.
Flexible NetFlow user-defined records provide the capability to monitor a contiguous section of a packet
of a user-configurable size, and use it in a flow record as a key or a non-key field along with other fields
and attributes of the packet. The section may potentially include any Layer 3 data from the packet.
The packet section fields allow the user to monitor any packet fields that are not covered by the Flexible
NetFlow predefined keys. The ability to analyze packet fields that are not collected with the predefined
keys enables more detailed traffic monitoring, facilitates the investigation of distributed denial of service
(dDoS) attacks, and enables implementation of other security applications such as URL monitoring.
Flexible NetFlow provides predefined types of packet sections of a user-configurable size. The following
Flexible NetFlow commands (used in flow record configuration mode) can be used to configure the
predefined types of packet sections:
collect ipv4 section header size header-sizeStarts capturing the number of bytes specified by the
header-size argument from the beginning of the IPv4 header of each packet.
collect ipv4 section payload size payload-sizeStarts capturing bytes immediately after the IPv4
header from each packet. The number of bytes captured is specified by the payload-size argument.
collect ipv6 section header size header-sizeStarts capturing the number of bytes specified by the
header-size argument from the beginning of the IPv6 header of each packet.
collect ipv6 section payload size payload-sizeStarts capturing bytes immediately after the IPv6
header from each packet. The number of bytes captured is specified by the payload-size argument.
The header-size and payload-size values are the sizes in bytes of these fields in the flow record. If the
corresponding fragment of the packet is smaller than the requested section size, Flexible NetFlow will
fill the rest of the section field in the flow record with zeros. If the packet type does not match the
requested section type, Flexible NetFlow will fill the entire section field in the flow record with zeros.
Flexible NetFlow adds a new Version 9 export format field type for the header and packet section types.
Flexible NetFlow will communicate to the NetFlow collector the configured section sizes in the
corresponding Version 9 export template fields. The payload sections will have a corresponding length
field that can be used to collect the actual size of the collected section.
Flow Monitors
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network
traffic monitoring. Flow monitors consist of a user-defined or predefined record, an optional flow
exporter, and a cache that is automatically created at the time the flow monitor is applied to the first
interface. Flow data is collected from the network traffic and added to the flow monitor cache during the
monitoring process based on the key and non-key fields in the flow record.
Flexible NetFlow can be used to perform different types of analysis on the same traffic. In Figure 3,
packet 1 is analyzed using a record designed for standard traffic analysis on the input interface and a
record designed for security analysis on the output interface.
Figure 3
Traffic
P5 P4 P3 P2
Key Fields
Packet 1
Flow Monitor 1
(Ethernet 0)
P1
Flow Monitor 2
(Ethernet 1)
Key Fields
Packet 1
Source IP
10.3.3.3
Packets
Source IP
10.3.3.3
Packets
Destination IP
10.2.2.2
Bytes
Destination IP
10.2.2.2
Time Stamps
Source port
23
Time Stamps
Input Interface
Ethernet 0
Destination port
22078
Next-Hop Address
SYN Flag
Layer 3 Protocol
TCP-6
TOS Byte
Input Interface
Ethernet 0
... Pkts
Source IP Dest. IP
... Pkts
E1
... 11000
10.3.3.3
E1
... 11000
10.2.2.2
10.2.2.2
E1
271755
Source IP Dest. IP
10.3.3.3
Figure 4 shows a more complex example of how you can apply different types of flow monitors with
custom records.
Figure 4
Complex Example of Using Multiple Types of Flow Monitors with Custom Records
ISP
IP
Peering
Flows
IP
IP
Branch
Campus
Data Center
WAN
Application Flows
Security Flows
IP Flows
Multicast
Flows
Teleworker
271756
IP
There are three types of flow monitor caches. You change the type of cache used by the flow monitor
after you create the flow monitor. The three types of flow monitor caches are as follows:
Normal, page 8
Immediate, page 8
Permanent, page 9
Normal
The default cache type is normal. In this mode, the entries in the cache are aged out according to the
timeout active and timeout inactive settings. When a cache entry is aged out, it is removed from the cache
and exported via any exporters configured.
Immediate
A cache of type immediate ages out every record as soon as it is created. As a result, every flow
contains just one packet. The commands that display the cache contents will provide a history of the
packets seen.
This mode is desirable when you expect only very small flows and you want a minimum amount of
latency between seeing a packet and exporting a report.
Caution
This command may result in a large amount of export data that can overload low-speed links and
overwhelm any systems that you are exporting to. We recommended that you configure sampling to
reduce the number of packets that are processed.
Note
A cache of type permanent never ages out any flows. A permanent cache is useful when the number
of flows you expect to see is low and there is a need to keep long-term statistics on the router. For
example, if the only key field in the flow record is the 8-bit IP ToS field, only 256 flows can be
monitored. To monitor the long-term usage of the IP ToS field in the network traffic, a permanent cache
can be used. Permanent caches are useful for billing applications and for an edge-to-edge traffic matrix
for a fixed set of flows that are being tracked. Update messages will be sent periodically to any flow
exporters configured according to the timeout update setting.
Note
When a cache becomes full in permanent mode, new flows will not be monitored. If this occurs, a Flows
not added message will appear in the cache statistics.
Note
A permanent cache uses update counters rather than delta counters. This means that when a flow is
exported, the counters represent the totals seen for the full lifetime of the flow and not the additional
packets and bytes seen since the last export was sent.
Flow Exporters
Flow exporters export the data in the flow monitor cache to a remote system, such as a server running
NetFlow collector, for analysis and storage. Flow exporters are created as separate entities in the
configuration. Flow exporters are assigned to flow monitors to provide data export capability for the flow
monitors. You can create several flow exporters and assign them to one or more flow monitors to provide
several export destinations. You can create one flow exporter and apply it to several flow monitors.
NetFlow Data Export Format Version 9
The basic output of NetFlow is a flow record. Several different formats for flow records have evolved as
NetFlow has matured. The most recent evolution of the NetFlow export format is known as Version 9.
The distinguishing feature of the NetFlow Version 9 export format is that it is template-based. Templates
provide an extensible design to the record format, a feature that should allow future enhancements to
NetFlow services without requiring concurrent changes to the basic flow-record format. Using templates
provides several key benefits:
Third-party business partners who produce applications that provide collector or display services for
NetFlow do not have to recompile their applications each time a new NetFlow feature is added.
Instead, they should be able to use an external data file that documents the known template formats.
New features can be added to NetFlow quickly without breaking current implementations.
NetFlow is future-proofed against new or developing protocols because the Version 9 format can
be adapted to provide support for them.
The Version 9 export format consists of a packet header followed by one or more template flow or data
flow sets. A template flow set provides a description of the fields that will be present in future data flow
sets. These data flow sets may occur later within the same export packet or in subsequent export packets.
Template flow and data flow sets can be intermingled within a single export packet, as illustrated in
Figure 5.
Packet
Header
Template
FlowSet
Data
FlowSet
Data
FlowSet
Template
FlowSet
271757
Figure 5
Data
FlowSet
NetFlow Version 9 will periodically export the template data so the NetFlow collector will understand
what data is to be sent and also export the data flow set for the template. The key advantage to Flexible
NetFlow is that the user configures a flow record, which is effectively converted to a Version 9 template
and then forwarded to the collector. Figure 6 is a detailed example of the NetFlow Version 9 export
format, including the header, template flow and data flow sets.
Note
The NetFlow Version 5 export format is a fixed export format that would provide limited information for
Flexible NetFlow data. This is why Flexible Netflow uses the Version 9 export format.
Figure 6
Header
First Template FlowSet
Template Record
First Record FlowSet
(Template ID 256)
First Data Record
Count = 4 (FlowSets)
System Uptime
UNIX Seconds
Package Sequence
Source ID
Template Record
Length = 28 bytes
Template Record
Template ID = 256
Field Count = 5
Length =
64 bytes
192.168.1.12
10.5.12.254
IPv4_SRCADDR (0x0008)
192.168.1.1
Length = 4
5009
IPv4_DSTADDR (0x000C)
5344385
Length = 4
192.168.1.27
IPv4_NEXT_HDP (0x000E)
Length = 4
PKTS:_32(0x0002)
10.5.12.23
192.168.1.1
748
Length = 4
388964
BYTES:_32(0x0001)
192.168.1.56
Length = 4
10.5.12.65
5
6534
271758
192.168.1.1
For more information on the Version 9 export format, refer to the white paper entitled Cisco IOS NetFlow
Version 9 Flow-Record Format, available at this url:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_white_paper09186a00800a3db9.shtml.
10
Flow Samplers
Flow samplers are used to reduce the load that Flexible NetFlow places on the networking device to
monitor traffic by limiting the number of packets that are analyzed. You can configure a rate of sampling
that is 1 out of a range of 2 to 32768 packets. For example, a sampling rate of 1 out of 2 results in the
analysis of 50 percent of the packets processed by the networking device.
Flow samplers are applied to interfaces in conjunction with a flow monitor to implement Flexible
NetFlow flow sampling. Packets are analyzed at the rate specified by the sampler and compared with the
flow record associated with the flow monitor. If the analyzed packets meet the criteria specified by the
flow record, they are added to the flow monitor cache.
Feature
Original
NetFlow
Flexible
NetFlow
Supported
Supported
Supported
Supported
Comments
11
Table 1
Feature
Original
NetFlow
Flexible
NetFlow
Supported
Supported
Comments
IPv6 support was removed from original
NetFlow in Cisco IOS Release
12.4(20)T.
The Flexible NetFlow - IPv6 Unicast
Flows feature implemented IPv6 support
for Flexible NetFlow in Cisco IOS
Release 12.4(20)T.
12
MPLS-Aware NetFlow
Supported
Not supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
NetFlow Subinterface
Support
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Not supported
NetFlow MIB
Supported
Not supported
Supported
Not supported
Table 1
Feature
Original
NetFlow
Flexible
NetFlow
Supported
Supported
Comments
In Cisco IOS release 12.4(9)T through
12.4(20)T Flexible NetFlow collects
statistics for multicast flows. However,
specific additional fields such as
replication counts for bytes and packets
are not supported.
The Flexible Netflow - IPv4 Multicast
Statistics Support feature implemented
support for capturing multicast
replication counts for bytes and packets
in Cisco IOS Release 12.4(22)T.
Supported
Partially
supported
Supported
Supported
Not supported
Supported
Supported
1. Flexible NetFlow has several predefined keys that emulate the traffic analysis capabilities of original NetFlow.
Where to Go Next
To implement a basic Flexible NetFlow configuration that emulates original NetFlow traffic analysis and
data export, refer to the Getting Started with Configuring Cisco IOS Flexible NetFlow module. To
implement other Flexible NetFlow configurations, refer to the Related Documents section on page 14.
13
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data
Flow Exporters
Customizing Flexible NetFlow for your network
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
14
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo, DCE, and
Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access
Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the
Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink,
Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime
Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet,
Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks
of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0809R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
2008 Cisco Systems, Inc. All rights reserved.
15
16
This feature roadmap lists the Cisco IOS features documented in the Cisco IOS Flexible NetFlow
Configuration Guide and maps them to the documents in which they appear. The roadmap is organized
so that you can select your release train and see the features in that release. Find the feature name you
are searching for and click on the URL in the Where Documented column to access the document
containing that feature.
Feature and Release Support
Table 1 lists Flexible NetFlow feature support for the following Cisco IOS software release trains:
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco
Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a
specific software release, feature set, or platform. To access Cisco Feature Navigator, go to
http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Table 1 lists the most recent release of each software train first and the features in alphabetical order
within the release.
Table 1
Release
Feature Name
Feature Description
Where Documented
12.2(33)SR
Flexible NetFlow
Table 1
Release
Feature Name
Feature Description
Where Documented
12.4(22)T
12.4(22)T
12.4(22)T
Flexible Netflow - Layer Support for collecting statistics for Layer 2 fields Customizing Cisco IOS
2 Fields
such as MAC addresses and virtual LAN (VLAN) Flexible NetFlow Flow
IDs from traffic was added.
Records and Flow Monitors
12.4(22)T
12.4(22)T
Flexible Netflow - Top N Support for analyzing the large amount of data
Talkers Support
Flexible NetFlow captures from the traffic in a
network by providing the ability to filter,
aggregate, and sort the data in the Flexible
NetFlow cache as it is displayed was added.
12.4(20)T
Table 1
Release
Feature Name
Feature Description
Where Documented
12.4(9)T
Flexible NetFlow
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo, DCE, and
Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access
Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the
Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink,
Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime
Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet,
Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks
of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0809R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
2008 Cisco Systems, Inc. All rights reserved.
This document contains information about and instructions for configuring Flexible NetFlow to emulate
the data capture, data analysis, and data export features of original NetFlow. The Flexible NetFlow
equivalents of some of the other features that have been added to original NetFlow, such as NetFlow
Subinterface Support, and Multiple Export Destinations, are covered in this document. The purpose of
this document is to help you get started using Flexible NetFlow as quickly as possible.
This document explains how to configure certain Flexible NetFlow features but does not explain them
in detail. The documents listed in the Related Documents section on page 23 contain more detailed
information on Flexible NetFlow features.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router.
NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides network
and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Contents
Configuration Examples for Emulating Original NetFlow Features with Flexible NetFlow, page 21
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
The networking device must be running a Cisco IOS release that supports Cisco IOS Flexible
NetFlow. See the Cisco IOS Flexible NetFlow Features Roadmap module for a list of
Cisco IOS software releases that support Flexible NetFlow.
IPv4 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding (CEF) or distributed CEF (dCEF).
IPv6 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding IPv6 (CEF IPv6) or distributed CEF IPv6
(dCEF IPv6).
Flexible NetFlow Netflow Original and NetFlow IPv4 Original Input Predefined Records,
page 3
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow Original and
NetFlow IPv4 Original Input Predefined Records
Field
Definition
IP ToS
Key
IP Protocol
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP source address.
Key
Transport Destination
Port
Key
Interface Input
Key
Flow Sampler ID
Key
IP Source AS
Non-key
IP Destination AS
Non-key
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
TCP Flags
Non-key
Interface Output
Non-key
Table 1
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow Original and
NetFlow IPv4 Original Input Predefined Records (continued)
Field
Definition
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
The configuration in the How to Get Started with Configuring Flexible NetFlow section on page 8 uses
the predefined Flexible NetFlow NetFlow original record.
Key and Non Key Fields Used by the Flexible NetFlow NetFlow IPv4 Original Output
Predefined Record
Field
Definition
IP ToS
Key
IP Protocol
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP destination address.
Key
Transport Destination
Port
Key
Interface Output
Key
Flow Sampler ID
Key
IP Source AS
Non-key
IP Destination AS
Non-key
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
TCP Flags
Non-key
Interface Input
Non-key
Table 2
Key and Non Key Fields Used by the Flexible NetFlow NetFlow IPv4 Original Output
Predefined Record (continued)
Field
Definition
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
The configuration in the Configuring Flexible NetFlow Egress Accounting for IPV4 and IPv6 Traffic:
Example section on page 21 uses the predefined Flexible NetFlow NetFlow original output record.
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original Input
Predefined Record
Field
Definition
Traffic Class
Key
Flow Label
Key
Flow label.
Protocol
Key
Extension Map
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP destination address.
Key
Transport Destination
Port
Key
Interface Input
Key
Flow Direction
Key
Flow Sampler
Key
Routing Source AS
Non-key
Routing Next-hop
Address
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
Table 3
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original Input
Predefined Record (continued)
Field
Definition
Non-key
Interface Output
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original
Output Predefined Record
Field
Definition
Traffic Class
Key
Flow Label
Key
Protocol
Key
Extension Map
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP destination address.
Key
Transport Destination
Port
Key
Interface Output
Key
Flow Direction
Key
Flow Sampler
Key
Routing Source AS
Non-key
Routing Next-hop
Address
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
Table 4
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original
Output Predefined Record (continued)
Field
Definition
Non-key
Interface Input
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
To capture the flow of traffic going to site 2 of VPN 1 from any remote VPN 1 sites, you enable a
flow monitor in output mode on link PE2-CE5 of provider edge router PE2.
To capture the flow of traffic going to site 1 of VPN 2 from any remote VPN 2 site, you enable a
flow monitor in output mode on link PE3-CE4 of the provider edge router PE3.
The flow data is stored in the Flexible NetFlow cache. You can use the show flow monitor monitor-name
cache command view the flow data in the cache.
Sample MPLS VPN Network Topology with Flexible Netflow - MPLS Egress NetFlow
feature
Site 2
VPN 1
C
VPN-SC
Backbone
Site 1
VPN 1
CE5
Collector 2
P
CE1
PE1
Site 2
VPN 2
CE2
P
PE2
Collector 1
PE3
Site 3
VPN 1
PE4
Site 1
VPN 2
Site 4
VPN 1
CE4
CE6
CE3
42949
Figure 1
If you configure a Flexible NetFlow exporter for the flow monitors you use for the Flexible Netflow MPLS Egress NetFlow feature, the PE routers will export the captured flows to the configured collector
devices in the provider network. Applications such as the Network Data Analyzer or the VPN Solution
Center (VPN-SC) can gather information from the captured flows and compute and display site-to-site
VPN traffic statistics.
Note
Flexible NetFlow emulation of original NetFlow requires the configuration of a flow monitor and the
application of the flow monitor to at least one interface that is receiving the traffic that you want to
analyze.
Note
Only the keywords and arguments required for the Flexible NetFlow commands used in these tasks are
explained in these tasks. For information on the other keywords and arguments available for these
Flexible NetFlow commands, refer to the Cisco IOS Flexible NetFlow Command Reference.
To configure and enable Flexible NetFlow using a predefined record, perform the following tasks:
Configuring a Flow Monitor for IPv4 Traffic Using the Flexible NetFlow NetFlow IPv4 Original
Input Predefined Record, page 9
Configuring a Flow Monitor for IPv6 Traffic Using the Flexible NetFlow NetFlow IPv6 Original
Input Predefined Record, page 10
Configuring a Flow Monitor for IPv4 Traffic Using the Flexible NetFlow
NetFlow IPv4 Original Input Predefined Record
To configure a flow monitor for IPv4 traffic using the Flexible NetFlow NetFlow IPv4 original input
predefined record for the flow monitor, perform the following required task.
Flow Monitors
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
Restrictions
You must remove a flow monitor from all of the interfaces to which you have applied it before you can
modify the record format of the flow monitor.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description text-string
5.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-1
Step 4
description text-string
Example:
Router(config-flow-monitor)# description Used
for monitoring IPv4 traffic
Step 5
Example:
Router(config-flow-monitor)# record netflow
ipv4 original-input
Step 6
end
Example:
Router(config-flow-monitor)# end
Configuring a Flow Monitor for IPv6 Traffic Using the Flexible NetFlow
NetFlow IPv6 Original Input Predefined Record
To configure a flow monitor for IPv6 traffic using the Flexible NetFlow NetFlow IPv6 original input
predefined record for the flow monitor, perform the following required task.
Flow Monitors
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
10
Restrictions
You must remove a flow monitor from all of the interfaces to which you have applied it before you can
modify the record format of the flow monitor.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-2
Step 4
description string
Example:
Router(config-flow-monitor)# description Used
for monitoring IPv6 traffic
Step 5
Example:
Router(config-flow-monitor)# record netflow
ipv6 original-input
Step 6
end
Example:
Router(config-flow-monitor)# end
11
Restrictions
When you specify the NetFlow original or the NetFlow IPv4 original input predefined record for the
flow monitor to emulate original NetFlow, the flow monitor can be used only for analyzing input
(ingress) traffic.
When you specify the NetFlow IPv4 original output predefined record for the flow monitor to emulate
the Egress NetFlow Accounting feature, the flow monitor can be used only for analyzing output (egress)
traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
5.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface ethernet 0/0
Step 4
Example:
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 input
Step 5
end
Example:
Router(config-if)# end
12
Restrictions
When you specify the NetFlow IPv6 original input predefined record for the flow monitor to emulate
original NetFlow, the flow monitor can be used only for analyzing input (ingress) traffic.
When you specify the NetFlow IPv6 original output predefined record for the flow monitor to emulate
the Egress NetFlow Accounting feature, the flow monitor can be used only for analyzing output (egress)
traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
5.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface ethernet 0/0
Step 4
Example:
Router(config-if)# ipv6 flow monitor
FLOW-MONITOR-2 input
Step 5
end
Example:
Router(config-if)# end
13
Prerequisites
The interface to which you applied the input flow monitor must be receiving traffic that meets the criteria
defined by the NetFlow original record before you can view the flows in the flow monitor cache.
SUMMARY STEPS
1.
enable
2.
3.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Step 3
14
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
FLOW-MONITOR-1
Input
on
FLOW-MONITOR-2
Input
on
15
Prerequisites
The interface to which you applied the input flow monitor must be receiving traffic that meets the criteria
defined by the NetFlow original record before you can view the flow data in the flow monitor cache.
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
16
1800 secs)
15 secs)
10.251.10.1
172.16.10.2
0
2048
Et0/0
0
0x00
1
0
0
172.16.7.2
/0
/24
0x00
Et1/0
733500
489
720892
975032
24
16
0
16
0
0
0
172.16.6.1
224.0.0.9
520
520
Et0/0
0
0xC0
17
0
0
0.0.0.0
/24
/0
0x00
Null
52
1
973804
973804
Normal
4096
6
8
1800 secs)
15 secs)
1048
1042
11
1031
0
0
0
0
0x00000040
2001:DB8:1:ABCD::1
2001:DB8:4:ABCD::2
3000
55
Et0/0
Input
0
17
0x00
0
0
::
/48
/0
0x00
Null
521192
9307
9899684
11660744
0
0x00000000
FE80::A8AA:BBFF:FEBB:CC03
FF02::9
17
521
521
Et0/0
Input
0
17
0xE0
0
0
::
/10
/0
0x00
Null
92
1
11653832
11653832
Flow Exporters
Flow exporters are used to send the data that you collect with Flexible NetFlow to a remote system such
as a NetFlow Collection Engine. Exporters use UDP as the transport protocol and use the Version 9
export format.
Restrictions
Each flow exporter supports only one destination. If you want to export the data to multiple destinations,
you must configure multiple flow exporters and assign them to the flow monitor.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
7.
exit
8.
9.
exporter exporter-name
10. end
18
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow exporter EXPORTER-1
Step 4
description string
Example:
Router(config-flow-exporter)# description
Exports to Chicago datacenter
Step 5
Example:
Router(config-flow-exporter)# destination
172.16.10.2
Step 6
Example:
Step 7
exit
Example:
Router(config-flow-exporter)# exit
Step 8
Example:
Router(config)# flow monitor FLOW-MONITOR-1
19
Step 9
Command or Action
Purpose
exporter exporter-name
Example:
Router(config-flow-monitor)# exporter
EXPORTER-1
Step 10
end
Example:
Router(config-flow-monitor)# end
SUMMARY STEPS
1.
enable
2.
3.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Step 3
20
Building configuration...
!
flow exporter EXPORTER-1
description Exports to Chicago datacenter
destination 172.16.10.2
transport udp 65
!
Configuring Flexible NetFlow Egress Accounting for IPV4 and IPv6 Traffic: Example, page 21
Configuring Flexible NetFlow Egress Accounting for IPV4 and IPv6 Traffic:
Example
The following example shows how to configure Flexible NetFlow Egress Accounting for IPv4 and IPv6
traffic.
This sample starts in global configuration mode:
!
flow monitor FLOW-MONITOR-1
record netflow ipv4 original-output
exit
!
!
flow monitor FLOW-MONITOR-2
record netflow ipv6 original-output
exit
!
ip cef
ipv6 cef
!
interface Ethernet0/0
ip address 172.16.6.2 255.255.255.0
ipv6 address 2001:DB8:2:ABCD::2/48
ip flow monitor FLOW-MONITOR-1 output
ipv6 flow monitor FLOW-MONITOR-2 output
!
21
The following example shows how to configure Flexible NetFlow to Emulate NetFlow Subinterface
Support for IPv6 traffic.
This sample starts in global configuration mode:
!
flow monitor FLOW-MONITOR-2
record netflow ipv6 original-input
exit
!
ip cef
ipv6 cef
!
interface Ethernet0/0.1
ipv6 address 2001:DB8:2:ABCD::2/48
ipv6 flow monitor FLOW-MONITOR-2 input
!
22
Where to Go Next
For information on advanced Flexible NetFlow configurations for specific purposes such as quality of
service (QoS) and bandwidth monitoring, application and user flow monitoring and profiling, and
security analysis, refer to the Customizing Cisco IOS Flexible NetFlow Flow Records and Flow
Monitors module.
If you want to configure additional options for data export for Flexible NetFlow, refer to the
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters module.
If you want to configure flow sampling to reduce the CPU overhead of analyzing traffic, refer to the
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
module.
If you want to configure any of the predefined records for Flexible NetFlow refer, to the Configuring
Cisco IOS Flexible NetFlow with Predefined Records module.
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data.
Flow Exporters
Customizing Flexible NetFlow
23
Standards
Standard
Title
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
24
Use Cisco Feature Navigator to find information about platform support and software image support.
Cisco Feature Navigator enables you to determine which Cisco IOS, Catalyst OS, and Cisco IOS XE
software images support a specific software release, feature set, or platform. To access Cisco Feature
Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note
Table 5
Table 5 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Feature Name
Releases
Flexible NetFlow
12.4(9)T
25
Table 5
Feature Name
Releases
12.4(22)T
12.4(20)T
26
This module contains information about and instructions for configuring Flexible NetFlow using
predefined records. Many of the Flexible NetFlow predefined records use the same key and non-key
fields as the aggregation caches available in original NetFlow. However, the predefined Flexible NetFlow
records do not perform aggregation.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a router. NetFlow
is the standard for acquiring IP operational data from IP networks. NetFlow provides network and
security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Contents
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
How to Configure Flexible NetFlow Using a Predefined Record for the Flow Monitor, page 18
Configuration Examples for Configuring Flexible NetFlow with Predefined Records, page 27
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
The networking device must be running a Cisco IOS release that supports Flexible NetFlow. See the
Cisco IOS Flexible NetFlow Features Roadmap module for a list of Cisco IOS software releases
that support Flexible NetFlow.
IPv4 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding (CEF) or distributed CEF (dCEF).
IPv6 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding IPv6 (CEF IPv6) or distributed CEF IPv6
(dCEF IPv6).
Flexible NetFlow Netflow Original and NetFlow IPv4 Original Input Predefined Records,
page 3
Key and Non Key-Fields Used by the Netflow Original and NetFlow IPv4 Original
Input Predefined Records
Field
Definition
IP ToS
Key
IP Protocol
Key
Key
IPv4 Destination
Address
Key
Table 1
Key and Non Key-Fields Used by the Netflow Original and NetFlow IPv4 Original
Input Predefined Records (continued)
Field
Definition
Key
Transport Destination
Port
Key
Interface Input
Key
Flow Sampler ID
Key
IP Source AS
Non-key
IP Destination AS
Non-key
Non-key
Non-key
TCP Flags
Non-key
Interface Output
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Key and Non Key Fields Used by the NetFlow IPv4 Original Output Predefined
Record
Field
Definition
IP ToS
Key
IP Protocol
Key
Key
IPv4 Destination
Address
Key
Key
Table 2
Key and Non Key Fields Used by the NetFlow IPv4 Original Output Predefined
Record (continued)
Field
Definition
Transport Destination
Port
Key
Interface Output
Key
Flow Sampler ID
Key
IP Source AS
Non-key
IP Destination AS
Non-key
Non-key
Non-key
TCP Flags
Non-key
Interface Input
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original Input
Predefined Record
Field
Definition
Traffic Class
Key
Flow Label
Key
Flow label.
Protocol
Key
Extension Map
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP destination address.
Key
Transport Destination
Port
Key
Table 3
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original Input
Predefined Record (continued)
Field
Definition
Interface Input
Key
Flow Direction
Key
Flow Sampler
Key
Routing Source AS
Non-key
Routing Next-hop
Address
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
Non-key
Interface Output
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Timestamp Sys-uptime
First
Non-key
Timestamp Sys-uptime
Last
Non-key
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original
Output Predefined Record
Field
Definition
Traffic Class
Key
Flow Label
Key
Protocol
Key
Extension Map
Key
IP Source Address
Key
IP source address.
IP Destination Address
Key
IP destination address.
Key
Transport Destination
Port
Key
Table 4
Key and Non Key-Fields Used by the Flexible NetFlow NetFlow IPv6 Original
Output Predefined Record (continued)
Field
Definition
Interface Output
Key
Flow Direction
Key
Flow Sampler
Key
Routing Source AS
Non-key
Routing Next-hop
Address
Non-key
IP Source Mask
Non-key
IP Destination Mask
Non-key
Non-key
Interface Input
Non-key
Counter Bytes
Non-key
Counter Packets
Non-key
Timestamp Sys-uptime
First
Non-key
Timestamp Sys-uptime
Last
Non-key
Note
This predefined record can be used to analyze IPv4 and IPv6 traffic.
Table 5 lists the key and non-key fields used in the Flexible NetFlow autonomous system predefined
record.
Table 5
Key and Non-Key Fields Used by the Flexible NetFlow Autonomous System
Predefined Record
Field
Definition
IP Source AS
Key
IP Destination AS
Key
Table 5
Key and Non-Key Fields Used by the Flexible NetFlow Autonomous System
Predefined Record (continued)
Field
Definition
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
Tip
This predefined record is particularly useful for generating autonomous system-to- autonomous system
traffic flow data.
Table 6 lists the key and non-key fields used in the Flexible NetFlow autonomous system TOS
predefined record.
Table 6
Key and Non-Key Fields Used by the Flexible NetFlow Autonomous System ToS
Predefined Record
Field
Definition
IP ToS
Key
IP Source autonomous
system
Key
IP Destination
autonomous system
Key
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Table 6
Key and Non-Key Fields Used by the Flexible NetFlow Autonomous System ToS
Predefined Record (continued)
Field
Definition
Counter Packets
Non-key
Non-key
Non-key
Note
Key and Non-Key Fields Used by the Flexible NetFlow BGP Next-hop Predefined
Record
Field
Definition
Routing Source AS
Key
Routing Next-hop
Address IPv6 BGP
Key
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Timestamp Sys-uptime
First
Non-key
Timestamp Sys-uptime
Last
Non-key
Note
Key and Non-Key Fields Used by the Flexible NetFlow BGP Next-hop ToS
Predefined Record
Field
Definition
IP ToS
Key
IP Source autonomous
system
Key
IP Destination
autonomous system
Key
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
This predefined record can be used to analyze IPv4 and IPv6 traffic.
Table 9 lists the key and non-key fields used in the Flexible NetFlow destination prefix predefined
record.
10
Table 9
Key and Non-Key Fields Used by the Flexible NetFlow Destination Prefix Predefined
Record
Field
Definition
IP Destination
autonomous system
Key
IPv4 or IPv6
Destination Prefix
Key
IPv4 or IPv6
Destination Mask
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
Key and Non Key Fields Used by the Flexible NetFlow Destination Prefix ToS
Predefined Record
Field
Definition
IP ToS
Key
IP Destination
autonomous system
Key
Key
11
Table 10
Key and Non Key Fields Used by the Flexible NetFlow Destination Prefix ToS
Predefined Record (continued)
Field
Definition
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
This predefined record can be used to analyze IPv4 and IPv6 traffic. For IPv6 traffic, a minimum prefix
mask length of 0 bits is assumed.
Table 11 lists the key and non-key fields used in the Flexible NetFlow prefix predefined record.
Table 11
12
Key and Non-Key Fields Used by the Flexible NetFlow Prefix Predefined Record
Field
Definition
IP Source autonomous
system
Key
IP Destination
autonomous system
Key
Key
Key
IPv4 or IPv6
Destination Prefix
Key
IPv4 or IPv6
Destination Mask
Key
Interface Input
Key
Interface Output
Key
Counter Bytes
Non-key
Table 11
Key and Non-Key Fields Used by the Flexible NetFlow Prefix Predefined Record
Field
Definition
Counter Packets
Non-key
Non-key
Non-key
Note
Key and Non-Key Fields Used by the Flexible NetFlow Prefix Port Predefined
Record
Field
Definition
IP ToS
Key
IP Protocol
Key
Key
Key
Key
Key
Transport Destination
Port
Key
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
13
Table 12
Key and Non-Key Fields Used by the Flexible NetFlow Prefix Port Predefined Record
(continued)
Field
Definition
Counter Packets
Non-key
Non-key
Non-key
Note
14
Key and Non-Key Fields Used by the Flexible NetFlow Prefix ToS Predefined Record
Field
Definition
IP ToS
Key
IP Source autonomous
system
Key
IP Destination
autonomous system
Key
Key
Key
Key
Interface Input
Key
Interface Output
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Table 13
Key and Non-Key Fields Used by the Flexible NetFlow Prefix ToS Predefined Record
Field
Definition
Non-key
Non-key
Note
This predefined record can be used to analyze IPv4 and IPv6 traffic.
Table 14 lists the key and non-key fields used in the Flexible NetFlow protocol port predefined record.
Table 14
Key and Non-Key Fields Used by the Flexible NetFlow Protocol Port Predefined
Record
Field
Definition
IP Protocol
Key
Key
Transport Destination
Port
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
15
Note
Key and Non-Key Fields Used by the Flexible NetFlow Protocol Port ToS Predefined
Record
Field
Definition
IP ToS
Key
IP Protocol
Key
Key
Transport Destination
Port
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
This predefined record can be used to analyze IPv4 and IPv6 traffic.
Table 16 lists the key and non-key fields used in the Flexible NetFlow source prefix predefined record.
Table 16
16
Key and Non-Key Fields Used by the Flexible NetFlow Source Prefix Predefined
Record
Field
Definition
IP Source autonomous
system
Key
Key
Key
Table 16
Key and Non-Key Fields Used by the Flexible NetFlow Source Prefix Predefined
Record (continued)
Field
Definition
Interface Input
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
Non-key
Non-key
Note
Key and Non-Key Fields Used by the Flexible NetFlow Source Prefix ToS Predefined
Record
Field
Definition
IP ToS
Key
IP Source autonomous
system
Key
Key
Key
Interface Input
Key
Flow Direction
Key
Counter Bytes
Non-key
Counter Packets
Non-key
17
Table 17
Key and Non-Key Fields Used by the Flexible NetFlow Source Prefix ToS Predefined
Record (continued)
Field
Definition
Non-key
Non-key
Note
Only the keywords and arguments required for the Flexible NetFlow commands used in these tasks are
explained in these tasks. For information on the other keywords and arguments available for these
Flexible NetFlow commands, refer to the Cisco IOS Flexible NetFlow Command Reference.
To configure and enable Flexible NetFlow using a predefined record, perform the following tasks:
Configuring a Flow Monitor for IPv4 Traffic Using a Predefined Record, page 18
Configuring a Flow Monitor for IPv6 Traffic Using a Predefined Record, page 20
Flow Monitors
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
18
Restrictions
You must remove a flow monitor from all of the interfaces on which you have applied it before you can
modify the record format of the flow monitor.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description text-string
5.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-1
Step 4
description text-string
Example:
Router(config-flow-monitor)# description Used
for monitoring IPv4 traffic
19
Step 5
Command or Action
Purpose
Example:
Router(config-flow-monitor)# record netflow
ipv4 original-input
or
Example:
Router(config-flow-monitor)# record
netflow-original
Step 6
end
Example:
Router(config-flow-monitor)# end
Flow Monitors
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
Restrictions
You must remove a flow monitor from all of the interfaces on which you have applied it before you can
modify the record format of the flow monitor.
SUMMARY STEPS
20
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-2
Step 4
description string
Example:
Router(config-flow-monitor)# description Used
for monitoring IPv6 traffic
Step 5
Example:
Router(config-flow-monitor)# record netflow
ipv6 original-input
Step 6
end
Example:
Router(config-flow-monitor)# end
Restrictions
When you specify the NetFlow original or the NetFlow IPv4 original input predefined record for the
flow monitor to emulate original NetFlow, the flow monitor can be used only for analyzing input
(ingress) traffic.
When you specify the NetFlow IPv4 original output predefined record for the flow monitor to emulate
the Egress NetFlow Accounting feature, the flow monitor can be used only for analyzing output (egress)
traffic.
21
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
5.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface ethernet 0/0
Step 4
Example:
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 input
and/or
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 output
Step 5
end
Example:
Router(config-if)# end
Restrictions
When you specify the NetFlow IPv6 original input predefined record for the flow monitor to emulate
original NetFlow, the flow monitor can be used only for analyzing input (ingress) traffic.
22
When you specify the NetFlow IPv6 original output predefined record for the flow monitor to emulate
the Egress NetFlow Accounting feature, the flow monitor can be used only for analyzing output (egress)
traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
5.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface ethernet 0/0
Step 4
Example:
Router(config-if)# ipv6 flow monitor
FLOW-MONITOR-2 input
and/or
Router(config-if)# ipv6 flow monitor
FLOW-MONITOR-2 output
Step 5
end
Example:
Router(config-if)# end
23
Prerequisites
The interface to which you applied the input flow monitor must be receiving traffic that meets the criteria
defined by the NetFlow original record before you can view the flows in the flow monitor cache.
SUMMARY STEPS
1.
enable
2.
3.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Step 3
24
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
FLOW-MONITOR-1
Input
on
FLOW-MONITOR-2
Input
on
Prerequisites
The interface to which you applied the input flow monitor must be receiving traffic that meets the criteria
defined by the NetFlow original record before you can view the flows in the flow monitor cache.
25
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Normal
4096
1
2
1800 secs)
15 secs)
8
7
0
7
0
0
0
0
172.16.10.0
/24
Et1/0
Input
4292430
4305
15853684
15860868
26
Normal
4096
6
8
1800 secs)
15 secs)
0
0x00000040
1048
1042
11
1031
0
0
0
2001:DB8:1:ABCD::1
2001:DB8:4:ABCD::2
3000
55
Et0/0
Input
0
17
0x00
0
0
::
/48
/0
0x00
Null
521192
9307
9899684
11660744
0
0x00000000
FE80::A8AA:BBFF:FEBB:CC03
FF02::9
521
521
Et0/0
Input
0
17
0xE0
0
0
::
/10
/0
0x00
Null
92
1
11653832
11653832
Configuring a Flexible NetFlow Predefined Record for IPv4 Traffic: Example, page 28
Configuring a Flexible NetFlow Predefined Record for IPv6 Traffic: Example, page 28
27
Where to Go Next
For information on advanced Flexible NetFlow configurations for specific purposes such as quality of
service (QoS) and bandwidth monitoring, application and user flow monitoring and profiling, and
security analysis, refer to the Customizing Cisco IOS Flexible NetFlow Flow Records and Flow
Monitors module.
If you want to configure flow sampling to reduce the CPU overhead of analyzing traffic refer, to the
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
module.
If you want to configure data export for Flexible NetFlow, refer to the Configuring Data Export for
Cisco IOS Flexible NetFlow with Flow Exporters module.
28
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data.
Flow Exporters
Customizing Flexible NetFlow
Standards
Standard
Title
MIBs
MIB
MIBs Link
None.
RFCs
RFC
Title
RFC3954
29
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
Note
30
Table 18 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Table 18
Feature Name
Releases
Flexible NetFlow
12.4(9)T
31
Table 18
Feature Name
Releases
12.4(20)T
32
This document contains information about and instructions for configuring flow exporters to export
Flexible NetFlow data to remote systems such as a UNIX server running NetFlow collector.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router.
NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides network
and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Contents
Prerequisites for Configuring Data Export for Flexible NetFlow with Flow Exporters, page 2
Restrictions for Configuring Data Export for Flexible NetFlow with Flow Exporters, page 2
Information About Data Export for Flexible NetFlow with Flow Exporters, page 2
How to Configure Data Export for Flexible NetFlow with Flow Exporters, page 3
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Prerequisites for Configuring Data Export for Flexible NetFlow with Flow Exporters
Configuration Examples for Flexible NetFlow Data Export with Flow Exporters, page 10
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
The networking device must be running a Cisco IOS release that supports Flexible NetFlow. See the
Cisco IOS Flexible NetFlow Features Roadmap module for a list of Cisco IOS software releases
that support Flexible NetFlow.
IPv4 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding (CEF) or distributed CEF (dCEF).
IPv6 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding IPv6 (CEF IPv6) or distributed CEF IPv6
(dCEF IPv6).
The NetFlow Version 5 export protocol that was first shipped in Cisco IOS Release 12.4(22)T is
supported only for flow monitors that use the Flexible NetFlow predefined records.
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
Flow Exporters
Flow exporters are created as separate components in a routers configuration. Exporters are assigned to
flow monitors to export the data from the flow monitor cache to a remote system such as a NetFlow
collector. Flow monitors can support more than one exporter. Each exporter can be customized to meet
the requirements of the flow monitor or monitors in which it is used and the NetFlow collector systems
to which it is exporting data.
Using flow exporters, you can create an exporter for every type of traffic that you want to analyze
so that you can send each type of traffic to a different NetFlow collector. Original NetFlow sends
the data in a cache for all of the analyzed traffic to a maximum of two export destinations.
Flow exporters support up to 10 exporters per flow monitor. Original NetFlow is limited to only two
export destinations per cache.
In Cisco IOS Release 12.4(20)T and newer releases, flow exporters can use class of service (CoS)
in the packets that are sent to export destinations to help ensure that the packets are given the correct
priority throughout the network. Original Netflow exporters do not use CoS in the packets that are
sent to export destinations.
In Cisco IOS Release 12.4(20)T and newer releases flow exporter, traffic can be encrypted.
Flow Exporters
Flow exporters are used to send the data that you collect with Flexible NetFlow to a remote system such
as a NetFlow collector. Flow exporters use UDP as the transport protocol.
Restrictions
Each flow exporter supports only one destination. If you want to export the data to multiple destinations,
you must configure multiple flow exporters and assign them to the flow monitor. Flow exporters are
added to flow monitors to enable data export from the flow monitor cache.
Note
Only the keywords and arguments required for the Flexible NetFlow commands used in these tasks are
explained in these tasks. For information about the other keywords and arguments available for these
Flexible NetFlow commands, refer to the Cisco IOS Flexible NetFlow Command Reference.
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
To configure data export for Flexible NetFlow, perform the tasks in this section:
Verifying That Data Export Is Enabled for the Flow Monitor, page 10 (optional)
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
7.
dscp dscp
8.
9.
10. output-features
11. template data timeout seconds
12. transport udp udp-port
13. ttl ttl
14. end
DETAILED STEPS
Command or Action
Step 1
enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
Step 3
Command or Action
Purpose
Example:
Step 4
description string
Example:
Router(config-flow-exporter)# description
Exports to the Chicago datacenter
Step 5
Example:
Router(config-flow-exporter)# destination
172.16.10.2
Step 6
Example:
Router(config-flow-exporter)# destination
172.16.10.2
Step 7
dscp dscp
Example:
Router(config-flow-exporter)# dscp 63
Step 8
Example:
Step 9
Example:
Router(config-flow-exporter)# option
exporter-stats timeout 120
Step 10
output-features
Example:
Router(config-flow-exporter)# output-features
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
Step 11
Command or Action
Purpose
Example:
Router(config-flow-exporter)# template data
timeout 120
Step 12
Example:
Step 13
ttl ttl
Example:
Router(config-flow-exporter)# ttl 15
Step 14
end
Example:
Router(config-flow-exporter)# end
SUMMARY STEPS
1.
enable
2.
3.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
Transport Protocol:
UDP
Destination Port:
650
Source Port:
55864
DSCP:
0x3F
TTL:
15
Output Features:
Used
Options Configuration:
exporter-stats (timeout 120 seconds)
interface-table (timeout 120 seconds)
sampler-table (timeout 120 seconds)
Step 3
Flow Monitors
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
Restrictions
You must remove a flow monitor from all of the interfaces to which you have applied it before you can
modify the record format of the flow monitor.
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
When you specify the NetFlow original or the NetFlow IPv4 original input or the NetFlow IPv6
original input predefined record for the flow monitor to emulate original NetFlow, the flow monitor can
be used only for analyzing input (ingress) traffic.
When you specify the NetFlow IPv4 original output or the NetFlow IPv6 original output predefined
record for the flow monitor to emulate the Egress NetFlow Accounting feature, the flow monitor can be
used only for analyzing output (egress) traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
5.
exporter exporter-name
6.
exit
7.
8.
9.
end
DETAILED STEPS
Command or Action
Step 1
enable
Purpose
Enables privileged EXEC mode.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-1
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
How to Configure Data Export for Flexible NetFlow with Flow Exporters
Step 4
Command or Action
Purpose
Example:
Router(config-flow-monitor)# record netflow
ipv4 original-input
and/or
Example:
Router(config-flow-monitor)# record netflow
ipv6 original-input
Step 5
exporter exporter-name
Example:
Router(config-flow-monitor)# exporter
EXPORTER-1
Step 6
exit
Example:
Router(config-flow-monitor)# exit
Step 7
Example:
Router(config)# interface ethernet 0/0
Step 8
Example:
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 input
and/or
Example:
Router(config-if)# ipv6 flow monitor
FLOW-MONITOR-2 input
Step 9
end
Example:
Router(config-if)# end
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Configuration Examples for Flexible NetFlow Data Export with Flow Exporters
Prerequisites
Before you can view the flows in the flow monitor cache, the interface to which you applied the input
flow monitor must be receiving traffic that meets the criteria defined by the NetFlow original record.
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
10
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Configuration Examples for Flexible NetFlow Data Export with Flow Exporters
The following display output shows that the flow monitor is exporting data to the two exporters:
Router# show flow monitor FLOW-MONITOR-1
Flow Monitor FLOW-MONITOR-1:
Description:
User defined
Flow Record:
netflow original-input
Flow Exporter:
EXPORTER-1
EXPORTER-2
Cache:
Type:
normal
Status:
allocated
Size:
4096 entries / 311316 bytes
Inactive Timeout: 15 secs
Active Timeout:
1800 secs
Update Timeout:
1800 secs
11
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Configuration Examples for Flexible NetFlow Data Export with Flow Exporters
Note
The Flexible NetFlow export packets to the destination host (IP address 10.0.1.2) are transmitted on
Ethernet 0/1 using QoS.
This sample starts in global configuration mode:
!
flow record FLOW-RECORD-1
match ipv4 source address
collect counter packets
!
flow exporter FLOW-EXPORTER-1
destination 10.0.1.2
output-features
dscp 18
!
flow monitor FLOW-MONITOR-1
record FLOW-RECORD-1
exporter FLOW-EXPORTER-1
cache entries 1024
!
ip cef
!
class-map match-any COS3
!
policy-map PH_LABS_FRL_64k_16k_16k_8k_8k
class COS3
bandwidth percent 2
random-detect dscp-based
random-detect exponential-weighting-constant 1
random-detect dscp 18 200 300 10
!
interface Ethernet0/0
ip address 10.0.0.1 255.255.255.0
ip flow monitor FLOW-MONITOR-1 input
!
interface Ethernet0/1
ip address 10.0.1.1 255.255.255.0
service-policy output PH_LABS_FRL_64k_16k_16k_8k_8k
!
The following display output shows that the flow monitor is exporting data using output feature support
that enables the exported data to use QoS:
Router# show flow monitor FLOW-MONITOR-1
Flow Exporter FLOW-EXPORTER-1:
Description:
User defined
Tranport Configuration:
Destination IP address: 10.0.1.2
Source IP address:
10.0.0.1
Transport Protocol:
UDP
Destination Port:
9995
Source Port:
56750
DSCP:
0x12
TTL:
255
Output Features:
Used
12
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Configuration Examples for Flexible NetFlow Data Export with Flow Exporters
The following display output shows that the flow monitor is exporting data to the two exporters:
Router# #show flow exporter FLOW-EXPORTER-6
Flow Exporter FLOW-EXPORTER-6:
Description:
User defined
Export protocol:
NetFlow Version 5
Transport Configuration:
Destination IP address: 172.31.90.23
Source IP address:
10.1.1.2
Transport Protocol:
UDP
Destination Port:
90
Source Port:
55950
DSCP:
0x0
TTL:
255
Output Features:
Not Used
13
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Where to Go Next
Where to Go Next
For information on advanced Flexible NetFlow configurations for specific purposes such as quality of
service (QoS) and bandwidth monitoring, application and user flow monitoring and profiling, and
security analysis, refer to the Customizing Cisco IOS Flexible NetFlow Flow Records and Flow
Monitors module.
If you want to configure flow sampling to reduce the CPU overhead of analyzing traffic, refer to the
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
module.
If you want to configure any of the predefined records for Flexible NetFlow refer, to the Configuring
Cisco IOS Flexible NetFlow with Predefined Records module.
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
14
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Feature Information for Flexible NetFlow
MIBs
MIB
MIBs Link
None.
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
15
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Feature Information for Flexible NetFlow
Note
Table 1
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Feature Name
Releases
Flexible NetFlow
12.4(9)T
16
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Feature Information for Flexible NetFlow
Table 1
Feature Name
Releases
12.4(20)T
12.4(20)T
12.4(22)T
17
Configuring Data Export for Cisco IOS Flexible NetFlow with Flow Exporters
Feature Information for Flexible NetFlow
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0809R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
2008 Cisco Systems, Inc. All rights reserved.
18
This document contains information about and instructions for customizing Flexible NetFlow flow
records and flow monitor requirements. If the tasks and configuration examples in the Getting Started
with Configuring Cisco IOS Flexible NetFlow module and the Configuring Cisco IOS Flexible
NetFlow with Predefined Records module were not suitable for your traffic analysis requirements, you
can use the information and instructions in this document to customize Flexible NetFlow to meet your
traffic analysis requirements.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a router. NetFlow
is the standard for acquiring IP operational data from IP networks. NetFlow provides network and
security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Contents
Contents
Prerequisites for Customizing Flexible NetFlow Flow Records and Flow Monitors, page 2
Information About Customizing Flexible NetFlow Flow Records and Flow Monitors, page 3
How to Customize Flexible NetFlow Flow Records and Flow Monitors, page 4
Configuration Examples for Customizing Flexible NetFlow Flow Records and Flow Monitors,
page 16
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
You are familiar with the Flexible NetFlow key fields as they are defined in the following commands
in the Cisco IOS Flexible NetFlow Command Reference:
match flow
match interface
match {ipv4 | ipv6}
match routing
match transport
You are familiar with the Flexible NetFlow non-key fields as they are defined in the following
commands in the Cisco IOS Flexible NetFlow Command Reference:
collect counter
collect flow
collect interface
collect {ipv4 | ipv6}
collect routing
collect timestamp sys-uptime
collect transport
The networking device must be running a Cisco IOS release that supports Flexible NetFlow. See the
Cisco IOS Flexible NetFlow Features Roadmap module for a list of Cisco IOS software releases
that support Flexible NetFlow.
IPv4 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding (CEF) or distributed CEF (dCEF).
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Information About Customizing Flexible NetFlow Flow Records and Flow Monitors
IPv6 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding IPv6 (CEF IPv6) or distributed CEF IPv6
(dCEF IPv6).
Key fields:
Destination IP address or destination IP subnet
TCP flags
Packet count
Non-key fields
Destination IP address
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Source IP address
Interface input and output
Tip
Many users configure a general Flexible NetFlow monitor that triggers a more detailed Flexible NetFlow
view of a DoS attack using these key and non-key fields.
Note
Only the keywords and arguments required for the Flexible NetFlow commands used in these tasks are
explained in these tasks. For information about the other keywords and arguments available for these
Flexible NetFlow commands, refer to the Cisco IOS Flexible NetFlow Command Reference.
To customize Flexible NetFlow flow records and flow monitors, and to enable Flexible NetFlow, perform
the following tasks:
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
enable
2.
configure terminal
3.
4.
description string
5.
6.
Repeat Step 5 as required to configure additional key fields for the record.
7.
collect ipv4 source {address | mask [minimum-mask mask] | prefix [minimum-mask mask]}
8.
Repeat Step 7 as required to configure additional non-key fields for the record
9.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
description string
Example:
Router(config-flow-record)# description Used
for basic traffic analysis
Step 5
Example:
Router(config-flow-record)# match ipv4
destination address
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Command or Action
Purpose
Step 6
Step 7
Note
Example:
Router(config-flow-record)# collect ipv4 source
address
Step 8
Step 9
end
Example:
Router(config-flow-record)# end
enable
2.
configure terminal
3.
4.
description string
5.
6.
Repeat Step 5 as required to configure additional key fields for the record.
7.
collect ipv6 source {address | mask [minimum-mask mask] | prefix [minimum-mask mask]}
8.
Repeat Step 7 as required to configure additional non-key fields for the record
9.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Step 3
Command or Action
Purpose
Example:
Router(config)# flow record FLOW-RECORD-2
Step 4
description string
Example:
Router(config-flow-record)# description Used
for basic IPv6 traffic analysis
Step 5
Example:
Router(config-flow-record)# match ipv6
destination address
Step 6
Step 7
Example:
Router(config-flow-record)# collect ipv6 source
address
Step 8
Step 9
end
Example:
Router(config-flow-record)# end
SUMMARY STEPS
1.
enable
2.
3.
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
Step 3
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Flow Monitor
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. These record formats can be one of the predefined formats, or
an advanced user can create a customized format using the flow record command. This task uses the
record that you created in the Configuring a Customized Flow Record section on page 4.
Prerequisites
If you want to use a customized record instead of using one of the Flexible NetFlow predefined records,
you must create the customized record before you can perform this task. Refer to the Configuring a
Customized Flow Record section on page 4 for information about and instructions for creating a
customized flow record.
If you want to add a flow exporter to the flow monitor for data export, you must create the exporter before
you can complete this task. Refer to the Configuring Data Export for Cisco IOS Flexible NetFlow with
Flow Exporters module for information about and instructions for creating a flow exporter.
Restrictions
You must use the no ip flow monitor command to remove a flow monitor from all of the interfaces to
which you have applied it before you can modify the parameters for the record command on the flow
monitor. For information about the ip flow monitor command, refer to the Cisco IOS Flexible NetFlow
Command Reference.
SUMMARY STEPS
1.
enable
2.
configure terminal
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
3.
4.
description string
5.
6.
cache {entries entries | timeout {active active | inactive inactive | update update} | type
{immediate | normal | permanent}}
7.
Repeat Step 6 as required to finish modifying the cache parameters for this flow monitor.
8.
9.
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
description string
Example:
Router(config-flow-monitor)# description Used
for basic ipv4 traffic analysis
Step 5
Example:
Router(config-flow-monitor)# record
FLOW-RECORD-1
Step 6
Example:
Router(config-flow-monitor)# cache entries 1000
10
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Command or Action
Purpose
Step 7
Step 8
Example:
Router(config-flow-monitor)# statistics packet
protocol
Step 9
Example:
Router(config-flow-monitor)# statistics packet
size
Step 10
exporter exporter-name
Example:
Router(config-flow-monitor)# exporter
EXPORTER-1
Step 11
end
Example:
Router(config-flow-monitor)# end
SUMMARY STEPS
1.
enable
2.
3.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
11
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Step 3
Restrictions
When you specify the NetFlow original or the NetFlow IPv4 original input or the NetFlow IPv6
original input predefined record for the flow monitor to emulate original NetFlow, the Flexible NetFlow
flow monitor can be used only for analyzing input (ingress) traffic.
When you specify the NetFlow IPv4 original output or the NetFlow IPv6 original output predefined
record for the flow monitor to emulate the Egress NetFlow Accounting feature, the Flexible NetFlow
flow monitor can be used only for analyzing output (egress) traffic.
SUMMARY STEPS
12
1.
enable
2.
configure terminal
3.
4.
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
5.
Repeat Steps 3 and 4 to activate a flow monitor on any other interfaces in the router over which you
want to monitor traffic.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface ethernet 0/0
Step 4
Example:
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 input
Step 5
Step 6
end
Example:
Router(config-if)# end
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
13
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
Router> enable
Router#
Step 2
FLOW-MONITOR-1
Input
on
FLOW-MONITOR-2
Input
on
FLOW-MONITOR-1
Output
on
FLOW-MONITOR-2
Output
on
Prerequisites
The interface on which you applied the input flow monitor must be receiving traffic that meets the
criteria defined by the NetFlow original record before you can view the flows in the flow monitor cache.
SUMMARY STEPS
1.
enable
2.
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
14
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
How to Customize Flexible NetFlow Flow Records and Flow Monitors
The show flow monitor name monitor-name cache format record command string displays the status,
statistics, and flow data in the cache for a flow monitor.
Router# show flow monitor name FLOW-MONITOR-1 cache format record
Cache type:
Cache size:
Current entries:
High Watermark:
Flows added:
Flows aged:
- Active timeout
(
- Inactive timeout (
- Event aged
- Watermark aged
- Emergency aged
Normal
1000
4
4
101
97
3
94
0
0
0
1800 secs)
15 secs)
172.16.10.5
10.10.11.1
25
25
72840
1821
21237828
22086520
6
172.16.10.2
10.10.10.2
20
20
3913860
7326
21238788
22088080
6
172.16.10.200
192.168.67.6
0
3073
51072
1824
21239228
22087980
1
Normal
1000
2
3
1800 secs)
15 secs)
95
93
0
93
0
0
0
2001:DB8:4:ABCD::2
15
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Configuration Examples for Customizing Flexible NetFlow Flow Records and Flow Monitors
2001:DB8:1:ABCD::1
33572
23
19140
349
2172704
2198272
6
FF02::9
FE80::A8AA:BBFF:FEBB:CC03
521
521
92
1
2195672
2195672
17
Configuring a Permanent Flow Record Cache with a Limited Number of Possible Flows: Example,
page 16
Configuring a Customized Flow Record Cache for Monitoring IPv6 Traffic: Example, page 17
Configuring Flexible NetFlow for Monitoring MAC and VLAN Statistics: Example, page 18
16
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Configuration Examples for Customizing Flexible NetFlow Flow Records and Flow Monitors
input
input
input
input
input
The display from the show flow monitor command shows the current status of the cache.
Router# show flow monitor QOS_MONITOR cache
Cache type:
Permanent
Cache size:
8192
Current entries:
2
High Watermark:
2
Flows added:
Updates sent
1800 secs)
2
0
17
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Configuration Examples for Customizing Flexible NetFlow Flow Records and Flow Monitors
record FLOW-RECORD-2
cache entries 1000
statistics packet protocol
statistics packet size
!
interface Ethernet0/0
ipv6 address 2001:DB8:2:ABCD::2/48
ipv6 flow monitor FLOW-MONITOR-2 input
!
interface Ethernet1/0
ipv6 address 2001:DB8:3:ABCD::1/48
ipv6 flow monitor FLOW-MONITOR-2 output
!
18
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Where to Go Next
Where to Go Next
If you want to configure data export for Flexible NetFlow, refer to the Configuring Data Export for
Cisco IOS Flexible NetFlow with Flow Exporters module.
If you want to configure flow sampling to reduce the CPU overhead of analyzing traffic, refer to the
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
module.
If you want to configure any of the predefined records for Flexible NetFlow, refer to the Configuring
Cisco IOS Flexible NetFlow with Predefined Records module.
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data.
Flow Exporters
Configuring flow sampling to reduce the overhead of
monitoring traffic with Flexible NetFlow
Standards
Standard
Title
19
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Feature Information for Flexible NetFlow
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
20
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Feature Information for Flexible NetFlow
Note
Table 1
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Feature Name
Releases
Flexible NetFlow
12.4(9)T
21
Customizing Cisco IOS Flexible NetFlow Flow Records and Flow Monitors
Feature Information for Flexible NetFlow
Table 1
Feature Name
Releases
12.4(22)T
12.4(20)T
22
This document contains information about and instructions for configuring sampling to reduce the CPU
overhead of analyzing traffic with Flexible NetFlow.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a router. NetFlow
is the standard for acquiring IP operational data from IP networks. NetFlow provides network and
security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Contents
How to Configure Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible
NetFlow, page 3
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Prerequisites for Using Flow Sampling
Configuration Examples for Using Flow Sampling to Reduce the CPU Overhead of Analyzing
Traffic with Flexible NetFlow, page 7
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
The networking device must be running a Cisco IOS release that supports Flexible NetFlow. See the
Cisco IOS Flexible NetFlow Features Roadmap module for a list of Cisco IOS software releases
that support Flexible NetFlow.
IPv4 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding (CEF) or distributed CEF (dCEF).
IPv6 Traffic
One of the following must be enabled on your router and on any interfaces on which you want to
enable Flexible NetFlow: Cisco Express Forwarding IPv6 (CEF IPv6) or distributed CEF IPv6
(dCEF IPv6).
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Information About Flexible NetFlow Samplers
Samplers, page 3
Samplers
Flow samplers are created as separate components in a routers configuration. Flow samplers are used to
reduce the load on the device that is running Flexible Netflow by limiting the number of packets that are
selected for analysis. Samplers use either random or deterministic sampling techniques (modes).
RandomA randomly selected sampling position is used each time a sample is taken.
Flow sampling exchanges monitoring accuracy for router performance. When you apply a sampler to a
flow monitor, the overhead load on the router of running the flow monitor is reduced because the number
of packets that the flow monitor must analyze is reduced. The reduction in the number of packets that
are analyzed by the flow monitor causes a corresponding reduction in the accuracy of the information
stored in the flow monitors cache.
Samplers are combined with flow monitors when they are applied to an interface with the ip flow
monitor command.
Note
Only the keywords and arguments required for the Flexible NetFlow commands used in these tasks are
explained in these tasks. For information about the other keywords and arguments available for these
Flexible NetFlow commands, refer to the Cisco IOS Flexible NetFlow Command Reference.
To configure flow sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow,
perform the following tasks:
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
How to Configure Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible NetFlow
Flow Monitor
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the
contents and layout of its cache entries. The record format can be one of the predefined record formats,
or an advanced user may create his or her own record format using the collect and match commands in
flow record configuration mode.
Restrictions
You must use the no ip flow monitor command to remove a flow monitor from all of the interfaces to
which you have applied it before you can modify the parameters for the record command on the flow
monitor.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
end
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow monitor FLOW-MONITOR-1
Step 4
description string
Example:
Router(config-flow-monitor)# description Used
for basic traffic analysis
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
How to Configure Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible NetFlow
Step 5
Command or Action
Purpose
Example:
Router(config-flow-monitor)# record netflow
ipv4 original-input
Step 6
end
Example:
Router(config-flow-monitor)# end
Restrictions
When you specify the NetFlow original or the NetFlow IPv4 original input or the NetFlow IPv6
original input predefined record for the flow monitor to emulate original NetFlow, the flow monitor can
be used only for analyzing input (ingress) traffic.
When you specify the NetFlow IPv4 original output or the NetFlow IPv6 original output predefined
record for the flow monitor to emulate the Egress NetFlow Accounting feature, the flow monitor can be
used only for analyzing output (egress) traffic.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
sampler sampler-name
4.
description string
5.
6.
exit
7.
8.
9.
end
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
How to Configure Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible NetFlow
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
sampler sampler-name
Example:
Router(config)# sampler SAMPLER-1
Step 4
description string
Example:
Router(config-sampler)# description Sample at
50%
Step 5
Example:
Step 6
exit
Example:
Router(config-sampler)# exit
Step 7
Example:
Router(config)# interface ethernet 0/0
Step 8
Assigns the flow monitor and the flow sampler that you
created to the interface to enable sampling.
Example:
Router(config-if)# ip flow monitor
FLOW-MONITOR-1 sampler SAMPLER-1 input
Step 9
end
Example:
Router(config-if)# end
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Configuration Examples for Using Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible
SUMMARY STEPS
1.
enable
2.
show sampler
DETAILED STEPS
Step 1
enable
The enable command enters privileged EXEC mode (enter the password if prompted).
Router> enable
Router#
Step 2
show sampler
The show sampler command shows the current status of the sampler that you specify.
Router# show sampler SAMPLER-1
Sampler SAMPLER-1:
ID:
2
Description:
Sample at 50%
Type:
random
Rate:
1 out of 2
Samples:
2482
Requests:
4964
Users (1):
flow monitor FLOW-MONITOR-1 (ip,Et0/0,I
Adding a Sampler to a Flow Monitor When a Flow Monitor Is Already Enabled on an Interface,
page 9
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Configuration Examples for Using Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible
The following example shows how to configure and enable deterministic sampling for IPv4 input traffic.
This sample starts in global configuration mode:
!
flow monitor FLOW-MONITOR-1
record netflow ipv4 original-input
exit
!
sampler SAMPLER-1
mode deterministic 1 out-of 2
exit
!
ip cef
!
interface Ethernet0/0
ip address 172.16.6.2 255.255.255.0
ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
!
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Configuration Examples for Using Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic with Flexible
!
interface Ethernet0/0
ipv6 address 2001:DB8:2:ABCD::2/48
ipv6 flow monitor FLOW-MONITOR-2 sampler SAMPLER-1 output
!
The following example shows how to configure and enable deterministic sampling for IPv6 input traffic.
This sample starts in global configuration mode:
!
flow monitor FLOW-MONITOR-2
record netflow ipv6 original-input
exit
!
sampler SAMPLER-1
mode deterministic 1 out-of 2
exit
!
ip cef
ipv6 cef
!
interface Ethernet0/0
ipv6 address 2001:DB8:2:ABCD::2/48
ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
!
The following example shows how to remove the flow monitor from the interface so that it can be
enabled with the sampler:
Router(config)# interface Ethernet0/0
Router(config-if)# no ip flow monitor FLOW-MONITOR-1 in
Router(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 in
The following example shows how to remove the flow monitor that was enabled with a sampler from the
interface so that it can be enabled without the sampler:
Router(config)# interface Ethernet0/0
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Where to Go Next
Where to Go Next
For information on advanced Flexible NetFlow configurations for specific purposes such as quality of
service (QoS) and bandwidth monitoring, application and user flow monitoring and profiling, and
security analysis, refer to the Customizing Cisco IOS Flexible NetFlow Flow Records and Flow
Monitors module.
If you want to configure any of the predefined records for Flexible NetFlow, refer to the Configuring
Cisco IOS Flexible NetFlow with Predefined Records module.
If you want to configure data export for Flexible NetFlow, refer to the Configuring Data Export for
Cisco IOS Flexible NetFlow with Flow Exporters module.
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data.
Flow Exporters
Customizing Flexible NetFlow
10
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Additional References
Standards
Standard
Title
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
11
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Feature Information for Flexible NetFlow
Note
12
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Feature Information for Flexible NetFlow
Table 1
Feature Name
Releases
Flexible NetFlow
12.4(9)T
13
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
Feature Information for Flexible NetFlow
Table 1
Feature Name
Releases
12.4(20)T
14
This document contains information about and instructions for configuring the Flexible Netflow - IPv4
Multicast Statistics Support feature. Prior to the introduction of the Flexible Netflow - IPv4 Multicast
Statistics Support feature, Flexible NetFlow was capable of analyzing IPv4 multicast traffic, but was not
capable of reporting the number of replicated bytes or the number of replicated packets in multicast
flows. The Flexible Netflow - IPv4 Multicast Statistics Support feature adds the capability of reporting
the number of replicated bytes and the number of replicated packets in multicast flows to Flexible
NetFlow.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a networking
device. NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides
network and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Contents
Contents
How to Configure IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow, page 3
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
You are familiar with the information in the Customizing Cisco IOS Flexible NetFlow Flow
Records and Flow Monitors module.
The networking device is running a Cisco IOS release that supports the Flexible Netflow - IPv4
Multicast Statistics Support feature. See the Cisco IOS Flexible NetFlow Features Roadmap
module for a list of Cisco IOS software releases that support the Flexible Netflow - IPv4 Multicast
Statistics Support feature.
The networking device is configured for IPv4 unicast routing and IPv4 multicast routing.
One of the following is enabled on your networking device and on any interfaces on which you want
to enable Flexible NetFlow: Cisco Express Forwarding (CEF), distributed CEF (dCEF).
When the replication-factor field is used in a flow record, it will only have a non-zero value in the
cache for ingress multicast traffic that is forwarded by the router. If the flow record is used with a
flow monitor in output (egress) mode and/or to monitor unicast traffic, the cache data for the
replication factor field is set to 0.
IPv6 traffic
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Information About IPv4 Multicast Statistics Support
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
4.
description string
5.
6.
Add key fields for the record as required using other match commands.
7.
8.
9.
Add non-key fields for the record as required using other collect commands.
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
How to Configure IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
DETAILED STEPS
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# flow record FLOW-RECORD-2
Step 4
description string
Example:
Router(config-flow-record)# description Used
for IPv4 multicast traffic analysis
Step 5
Example:
Step 6
Step 7
Example:
Step 8
Example:
Step 9
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
How to Configure IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Step 10
Command or Action
Purpose
Example:
Router(config)# flow monitor FLOW-MONITOR-2
Step 11
description string
Example:
Router(config-flow-monitor)# description Used
for IPv4 multicast traffic analysis
Step 12
record record-name
Example:
Router(config-flow-monitor)# record
FLOW-RECORD-2
Step 13
Example:
Router(config)# interface ethernet 0/0
Step 14
Example:
Step 15
Step 16
end
Example:
Router(config-if)# end
Examples
The following output from the show flow monitor command shows four multicast flows and three
unicast flows:
Router# show flow monitor FLOW-MONITOR-2 cache
Cache type:
Cache size:
Current entries:
High Watermark:
Flows added:
Flows aged:
Normal
4096
8
8
4074
4066
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Configuration Examples for IPv4 Multicast Statistics Support
Active timeout
(
Inactive timeout (
Event aged
Watermark aged
Emergency aged
IP IS MULTICAST
===============
Yes
Yes
No
No
No
Yes
No
Yes
1800 secs)
15 secs)
46
4020
0
0
0
pkts rep
==========
16642
16621
0
0
0
0
0
0
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow: Example, page 6
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow:
Example
This example configures the following:
IPv4 multicast destination addresses (indicating that the IPv4 traffic is multicast traffic) as a key
field.
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Where to Go Next
Where to Go Next
If you want to configure data export for Flexible NetFlow, refer to the Configuring Data Export for
Cisco IOS Flexible NetFlow with Flow Exporters module.
If you want to configure flow sampling to reduce the CPU overhead of analyzing traffic, refer to the
Using Cisco IOS Flexible NetFlow Flow Sampling to Reduce the CPU Overhead of Analyzing Traffic
module.
If you want to configure any of the predefined records for Flexible NetFlow, refer to the Configuring
Cisco IOS Flexible NetFlow with Predefined Records module.
Additional References
The following sections provide references related to Flexible NetFlow.
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data.
Flow Exporters
Configuring flow sampling to reduce the overhead of
monitoring traffic with Flexible NetFlow
Standards
Standard
Title
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Feature Information for IPv4 Multicast Statistics Support
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
RFC #3954
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Feature Information for IPv4 Multicast Statistics Support
Note
Table 1
Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
Feature Name
Releases
Feature Information
Flexible NetFlow
12.4(9)T
Configuring IPv4 Multicast Statistics Support for Cisco IOS Flexible NetFlow
Feature Information for IPv4 Multicast Statistics Support
Table 1
Feature Information for Flexible Netflow - IPv4 Multicast Statistics Support (continued)
Feature Name
Releases
Feature Information
12.4(22)T
10
This document contains information about and instructions for using the Flexible NetFlow - Top N
Talkers Support feature. The Flexible NetFlow - Top N Talkers Support feature helps you analyze the
large amount of data that Flexible NetFlow captures from the traffic in your network by providing the
ability to filter, aggregate, and sort the data in the Flexible NetFlow cache as you display it. When you
are sorting and displaying the data in the cache, you can limit the display output to a specific number of
entries with the highest values (Top N Talkers) for traffic volume, packet counters, and so on. The
Flexible NetFlow - Top N Talkers Support feature facilitates real-time traffic analysis by requiring only
the use of show commands, which can be entered in many different variations using the available
keywords and arguments to meet your traffic data analysis requirements.
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router.
NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides network
and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis
parameters for your specific requirements. Flexible NetFlow makes it easier to create more complex
configurations for traffic analysis and data export through the use of reusable configuration components.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Contents
Contents
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers, page 4
You are familiar with the information in the Cisco IOS Flexible NetFlow Overview module.
The networking device is running a Cisco IOS release that supports the Flexible NetFlow - Top N
Talkers Support feature. See the Feature Information for Flexible NetFlow Top N Talkers section
on page 15 for a list of Cisco IOS software releases that support Flexible NetFlow.
There are no configuration tasks associated with the Flexible NetFlow - Top N Talkers Support feature.
Therefore, in order to use the Flexible NetFlow - Top N Talkers Support feature, traffic analysis with
Flexible NetFlow must already be configured about the networking device. See the Cisco IOS Flexible
NetFlow Features Roadmap module for information on configuring traffic analysis on your networking
device with Flexible NetFlow.
Combined Use of Flow Filtering, Flow Aggregation, and Flow Sorting with Top N Talkers, page 4
Flow Filtering
The flow filtering function of the Flexible NetFlow - Top N Talkers Support feature filters the flow data
in a flow monitor cache based on the criteria that you specify, and displays the data.
The flow filtering function of the Flexible NetFlow - Top N Talkers Support feature is provided by the
show flow monitor cache filter command. For more information on the show flow monitor cache filter
command, refer to the Cisco IOS Flexible NetFlow Command Reference.
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Information About Flexible NetFlow Top N Talkers
Flow Aggregation
Flow aggregation using the show flow monitor cache aggregate command allows you to dynamically
view the flow information in a cache using a different flow record than the cache was originally created
from. Only the fields in the cache will be available for the aggregated flows.
The flow aggregation function of the Flexible NetFlow - Top N Talkers Support feature is provided by
the show flow monitor cache aggregate command. For more information on the show flow monitor
cache aggregate command, refer to the Cisco IOS Flexible NetFlow Command Reference.
Note
The arguments and keywords that you can use after filter, aggregation, and sort are not included in
Table 1. For more information on the arguments and keywords that you can use after filter, aggregation,
and sort, refer to the Cisco IOS Flexible NetFlow Command Reference.
Table 1
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
Combined Use of Flow Filtering, Flow Aggregation, and Flow Sorting with
Top N Talkers
Although each of the show commands that make up the Flexible NetFlow - Top N Talkers Support
feature can be used individually for traffic analysis; they provide much greater analytical capabilities
when they are used together. When you use any combination of the three show commands, you enter
only the common prefix of show flow monitor monitor-name cache followed by filter, aggregation,
sort, and the arguments and keywords available for filter, aggregation, sort, as required. For example,
show flow monitor monitor-name cache filter options aggregation options sort options
where options is any permissible combination of arguments and keywords. See the Examples for
Flexible NetFlow Top N Talkers section on page 10 for more information.
Sorting Flow Data from the Flexible NetFlow Cache and Displaying the Top N Talkers, page 8
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
SUMMARY STEPS
1.
enable
2.
show flow monitor [name] monitor-name cache filter options [regexp regexp] [...options [regexp
regexp] [format {csv | record | table}
DETAILED STEPS
Step 1
enable
Enters privileged EXEC mode.
Router> enable
Step 2
show flow monitor [name] monitor-name cache filter options [regexp regexp] [...options [regexp
regexp] [format {csv | record | table}
Filters the flow monitor cache data on the IPv4 type of service (ToS) value.
Router# show flow monitor FLOW-MONITOR-3 cache filter ipv4 tos regexp 0x(C0|50)
Cache type:
Cache size:
Current entries:
High Watermark:
Flows added:
Flows aged:
- Active timeout
(
- Inactive timeout (
- Event aged
- Watermark aged
- Emergency aged
IPV4 SOURCE ADDRESS:
IPV4 DESTINATION ADDRESS:
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
INTERFACE INPUT:
FLOW SAMPLER ID:
IP TOS:
IP PROTOCOL:
ip source as:
ip destination as:
ipv4 next hop address:
ipv4 source mask:
ipv4 destination mask:
tcp flags:
interface output:
counter bytes:
counter packets:
timestamp first:
timestamp last:
Normal
4096
19
38
1800 secs)
15 secs)
3516
3497
52
3445
0
0
0
10.1.1.1
255.255.255.255
520
520
Et0/0
0
0xC0
17
0
0
0.0.0.0
/24
/0
0x00
Null
52
1
18:59:46.199
18:59:46.199
Matched 1 flow
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
SUMMARY STEPS
1.
enable
2.
show flow monitor [name] monitor-name cache aggregate {{options [...options] [collect options
[...options]] | record record-name} [format {csv | record | table}}
DETAILED STEPS
Step 1
enable
Enters privileged EXEC mode.
Router> enable
Step 2
show flow monitor [name] monitor-name cache aggregate {{options [...options] [collect options
[...options]] | record record-name} [format {csv | record | table}}
Aggregates the flow monitor cache data on the IPv4 destination address and displays the cache data for
the IPv4 protocol type and input interface non-key fields:
Router# show flow monitor FLOW-MONITOR-3 cache aggregate ipv4 destination address collect
ipv4 protocol interface input
Processed 17 flows
Aggregated to 7 flows
IPV4 DST ADDR
===============
224.192.16.4
224.192.16.1
224.192.18.1
224.192.45.12
255.255.255.255
224.0.0.13
224.0.0.1
intf input
====================
Et0/0
Et0/0
Et0/0
Et0/0
Et0/0
Et0/0
Et0/0
flows
==========
3
3
4
4
1
1
1
bytes
==========
42200
17160
18180
14440
52
54
28
pkts
==========
2110
858
909
722
1
1
1
ip prot
=======
1
1
1
1
17
103
2
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
SUMMARY STEPS
1.
enable
2.
show flow monitor [name] monitor-name cache sort options [top [number]] [format {csv | record
| table}]
DETAILED STEPS
Step 1
enable
Enters privileged EXEC mode.
Router> enable
Step 2
show flow monitor [name] monitor-name cache sort options [top [number]] [format {csv | record |
table}]
Displays the cache data sorted on the number of packets from highest to lowest.
Note
When the top keyword is not used, the default number of sorted flows shown is 20.
Router# show flow monitor FLOW-MONITOR-1 cache sort highest counter packets
Processed 26 flows
Aggregated to 26 flows
Showing the top 20 flows
IPV4 SOURCE ADDRESS:
IPV4 DESTINATION ADDRESS:
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
INTERFACE INPUT:
FLOW SAMPLER ID:
IP TOS:
IP PROTOCOL:
ip source as:
ip destination as:
ipv4 next hop address:
ipv4 source mask:
ipv4 destination mask:
tcp flags:
interface output:
counter bytes:
counter packets:
timestamp first:
timestamp last:
10.1.1.3
172.16.10.11
443
443
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/0
/24
0x00
Et1/0.1
22760
1569
19:42:32.924
19:57:28.656
10.10.11.2
172.16.10.6
65
65
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/0
/24
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
tcp flags:
interface output:
counter bytes:
counter packets:
timestamp first:
timestamp last:
.
.
.
IPV4 SOURCE ADDRESS:
IPV4 DESTINATION ADDRESS:
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
INTERFACE INPUT:
FLOW SAMPLER ID:
IP TOS:
IP PROTOCOL:
ip source as:
ip destination as:
ipv4 next hop address:
ipv4 source mask:
ipv4 destination mask:
tcp flags:
interface output:
counter bytes:
counter packets:
timestamp first:
timestamp last:
0x00
Et1/0.1
22720
568
19:42:34.264
19:57:28.428
10.234.53.1
172.16.10.2
0
2048
Et0/0.1
0
0x00
1
0
0
172.16.7.2
/0
/24
0x00
Et1/0.1
15848
213
19:42:36.904
19:57:27.888
192.168.67.6
172.16.10.200
0
3073
Et0/0.1
0
0x00
1
0
0
172.16.7.2
/0
/24
0x00
Et1/0.1
15848
344
19:42:36.852
19:57:27.836
Sorting Flow Data from the Flexible NetFlow Cache and Displaying the Top N
Talkers
This task shows you how to use the show flow monitor cache sort command to sort the flow monitor
cache data, and to limit the display results to a specific number of high volume flows. For more
information on the show flow monitor cache sort command, refer to the Cisco IOS Flexible NetFlow
Command Reference.
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
How to Analyze Network Traffic With Cisco IOS Flexible NetFlow Top N Talkers
To sort the flow monitor cache data and limit the display output using to a specific number of high
volume flows, perform the following task:
SUMMARY STEPS
1.
enable
2.
show flow monitor [name] monitor-name cache sort options [top [number]] [format {csv | record
| table}]
DETAILED STEPS
Step 1
enable
Enters privileged EXEC mode.
Router> enable
Step 2
show flow monitor [name] monitor-name cache sort options [top [number]] [format {csv | record |
table}]
Displays the cache data sorted on the number of packets from highest to lowest and limits the output to
the three highest volume flows:
Router# show flow monitor FLOW-MONITOR-1 cache sort highest counter packets top 3
Processed 25 flows
Aggregated to 25 flows
Showing the top 3 flows
IPV4 SOURCE ADDRESS:
IPV4 DESTINATION ADDRESS:
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
INTERFACE INPUT:
FLOW SAMPLER ID:
IP TOS:
IP PROTOCOL:
ip source as:
ip destination as:
ipv4 next hop address:
ipv4 source mask:
ipv4 destination mask:
tcp flags:
interface output:
counter bytes:
counter packets:
timestamp first:
timestamp last:
10.1.1.3
172.16.10.11
443
443
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/0
/24
0x00
Et1/0.1
32360
1897
19:42:32.924
20:03:47.100
10.10.11.2
172.16.10.6
65
65
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/0
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Examples for Flexible NetFlow Top N Talkers
/24
0x00
Et1/0.1
32360
809
19:42:34.264
20:03:48.460
172.16.1.84
172.16.10.19
80
80
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/24
/24
0x00
Et1/0.1
32320
345
19:42:34.512
20:03:47.140
Filtering, Aggregating, and Sorting Flow Data from the Flexible NetFlow Cache and Displaying the
Top Talkers: Example, page 10
Filtering, Aggregating, and Sorting Flow Data from the Flexible NetFlow Cache
and Displaying the Top Talkers: Example
The following example combines filtering, aggregation, collecting additional field data, sorting the flow
monitor cache data, and limiting the display output to a specific number of high volume flows (top
talkers).
This sample runs in privileged EXEC mode:
Router# show flow monitor FLOW-MONITOR-1 cache filter ipv4 protocol regexp (1|6) aggregate
ipv4 destination address collect ipv4 protocol sort counter bytes top 4
Processed 26 flows
Matched 26 flows
Aggregated to 13 flows
Showing the top 4 flows
10
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Examples for Flexible NetFlow Top N Talkers
flows
==========
12
2
2
1
bytes
==========
1358370
44640
44640
22360
pkts
==========
6708
1116
1116
559
The following example combines filtering using a regular expression, aggregation using a predefined
record, sorting the flow monitor cache data, limiting the display output to a specific number of high
volume flows (top talkers), and displaying the output in record format.
This sample runs in privileged exec mode:
Router# show flow monitor FLOW-MONITOR-1 cache filter ipv4 source address regexp 10.*
aggregate record netflow ipv4 protocol-port sort transport destination-port top 5 format
record
Processed 26 flows
Matched 15 flows
Aggregated to 10 flows
Showing the top 5 flows
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
FLOW DIRECTION:
IP PROTOCOL:
counter flows:
counter bytes:
counter packets:
timestamp first:
timestamp last:
0
0
Input
1
1
387800
700
17:12:30.712
17:30:52.936
20
20
Input
6
2
56000
1400
17:12:29.532
17:30:53.148
21
21
Input
6
2
56000
1400
17:12:29.572
17:30:53.196
22
22
Input
6
1
28000
700
17:12:29.912
17:30:52.168
25
25
11
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Examples for Flexible NetFlow Top N Talkers
FLOW DIRECTION:
IP PROTOCOL:
counter flows:
counter bytes:
counter packets:
timestamp first:
timestamp last:
Input
6
2
56000
1400
17:12:29.692
17:30:51.968
12
Normal
4096
26
26
1800 secs)
15 secs)
10.10.10.2
172.16.10.2
21
21
Et0/0.1
0
0x00
6
0
0
172.16.7.2
/0
/24
0x00
Et1/0.1
17200
430
17:03:58.071
17:15:14.615
172.30.231.193
172.16.10.2
21
21
Et0/0.1
0
0x00
6
0
0
172.16.7.2
241
215
50
165
0
0
0
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Additional References
/0
/24
0x00
Et1/0.1
17160
429
17:03:59.963
17:15:14.887
Matched 2 flows
flows
==========
2
1
3
3
2
2
1
1
1
1
1
1
1
1
2
2
1
bytes
==========
1400828
19096
73656
73616
54560
54560
27280
27280
27280
27280
27280
27280
27280
27280
54520
54520
52
pkts
==========
1364
682
2046
2045
1364
1364
682
682
682
682
682
682
682
682
1363
1363
1
Router#
Additional References
The following sections provide references related to the Flexible NetFlow - Top N Talkers Support
feature.
13
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Additional References
Related Documents
Related Topic
Document Title
Configuring flow exporters to export Flexible NetFlow Configuring Data Export for Cisco IOS Flexible NetFlow with
data
Flow Exporters
Customizing Flexible NetFlow
Standards
Standard
Title
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
14
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Feature Information for Flexible NetFlow Top N Talkers
Technical Assistance
Description
Link
http://www.cisco.com/techsupport
Note
Table 2 lists only the Cisco IOS software release that introduced support for a given feature in a given
Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS
software release train also support that feature.
15
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Feature Information for Flexible NetFlow Top N Talkers
Table 2
Feature Name
Releases
12.4(22)T
16
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Feature Information for Flexible NetFlow Top N Talkers
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human
Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet,
AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork
Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace,
MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare,
SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0807R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.
2008 Cisco Systems, Inc. All rights reserved.
17
Using Cisco IOS Flexible NetFlow Top N Talkers to Analyze Network Traffic
Feature Information for Flexible NetFlow Top N Talkers
18