Configuring flow export: Difference between revisions
No edit summary |
No edit summary |
||
Line 102: | Line 102: | ||
=== Cisco configuration example === | === Cisco configuration example === | ||
This is how a Flexible NetFlow configuration would look like on a CISCO | This is how a Flexible NetFlow configuration would look like on a CISCO 3800 Series router with a recent IOS. The router has two physical interfaces facing the network (WAN). Router configuration that is not part of NetFlow have been left out for clarity. Please note that in most cases the collector needs to be able to query the router by SNMP in order to "discover" the FED's configuration an you muist specify the capacity of the interface (bps) to enable the reporter to calculate interface utilization (%) correctly. | ||
<pre>ip access-list standard SNMP-NS | <pre>ip access-list standard SNMP-NS | ||
permit 10.200.255.123 | permit 10.200.255.123 |
Revision as of 08:28, 15 January 2018
Introduction
Correct configuration of Flow Exporting Devices (FED) is key to Flow Based Network Analysis. Errors made during configuration will result in missing or duplicate data and is difficult to spot. Vendors of network equipment are not making it easy and most of them are using a proprietary method in order to enable network flow record exports to the collector (in our case TVF or TVA).
Furthermore, some collectors require a special setting on FED in order to undersand its flow records correctly.
This article is trying to decribe the idea behind network flow reporting and we hope it will help you to determine the correct procedure on how to confgure your FEDs.
For a complete overview of IP Flow Information eXchange (IPFIX), we recommend the reading of RFC 3917.
If you are aware of vendor specific issues with the configuration of flow exports, it is greatly appreciated if you let us know.
Solution
Definitions
FED
A Flow Enabled Device is any L3 and in some cases L2 device sending flow records to a collector.
Flow
A flow is defined as a stream of packets between a given source and a given destination. For example, in client-server computing a TCP sessions consists of two flows: one flow from client to server and the second flow from server to client.
Flow record
A flow record contains information about a specific flow that was metered at an observation point. A flow record contains measured properties of the flow (e.g., the total number of bytes of all packets of the flow, flow duration and the physical or virtual input interface i.e. where the packets entered the FED) and usually characteristic properties of the flow (e.g., source/destination IP address, protocol, port, ToS/DiffServ marking, ...).
Sensor
A sensor is a meter located at an observation point. It will "observe" packets going by the observation point and "build" the flow record decribing the flow. A sensor will meter packets in one direction only (ingress/in or egress/out) but some vendors use sensors that are bidirectional. Historically, a sensor was ingress/in only, so if left unspecified by a vendor, you may assume the sensor being unidirectional and ingress/in only.
Collector
A flow collector is most likely a server that collects the flow records and stores them in in a file or database. In TruView, TruView Flow is the collector.
Reporter
The reporter is an application running on the collector that data mines the records to produce statistical results. In some cases, collector and reporter are the same server. In TruView,TruView Central is the reporter.
Global configuration
The way to enable flow monitoring and flow exports will vary from vendor to vendor. At large you have to configure these parameters:
Destination
IP address of the collector
Port
UDP port where the collector is listening
Active flow timeout
Interval to send flow record updates in cse of a long duration flow. This setting should match the smallest granularity of the database on the collector. In case of TruView, this is one minute.
Inactive flow timeout
Interval of inactivity (no packets) that marks a flow as inactive. The recommended setting is 15 seconds.
Flow record format
With the introduction of CISCO's Flexible NetFlow and the standardization of IPFIX, the PDU of a flow record is no longer uniformely defined. The fields contained in the PDU should reflect the reporter's capabilities. In case of TruView the flow record must contain at least the following information:
- source address
- destination addresstos
- protocol
- source port
- destination port
- input interface
- tcp flags
- number of bytes
- number of packets
- timestamp of the first packet of the flow
- timestamp of the last packet of the flow
Interface configuration
If this is your first experience with configuring flow export on network devices, we recommend you make a drawing of the device, its interfaces (physical and virtual) and every flow that goes through the device. |
Basically, this is the science of deploying sensors so that EVERY flow that goes through the FED is metered. It is equally important to make sure NO flow is metered more than once.
Cisco configuration example
This is how a Flexible NetFlow configuration would look like on a CISCO 3800 Series router with a recent IOS. The router has two physical interfaces facing the network (WAN). Router configuration that is not part of NetFlow have been left out for clarity. Please note that in most cases the collector needs to be able to query the router by SNMP in order to "discover" the FED's configuration an you muist specify the capacity of the interface (bps) to enable the reporter to calculate interface utilization (%) correctly.
ip access-list standard SNMP-NS permit 10.200.255.123 snmp-server community N3tsc0ut RO SNMP-NS ! ! flow record record-ns-1-in match ipv4 tos match ipv4 protocol match ipv4 source address match ipv4 destination address match transport source-port match transport destination-port match interface input collect transport tcp flags collect counter bytes long collect counter packets long collect timestamp absolute first collect timestamp absolute last ! ! flow record record-ns-1-out match ipv4 tos match ipv4 protocol match ipv4 source address match ipv4 destination address match transport source-port match transport destination-port match interface output collect transport tcp flags collect counter bytes long collect counter packets long collect timestamp absolute first collect timestamp absolute last ! ! flow exporter netscout-1 destination 10.200.255.123 source Vlan1301 transport udp 2055 template data timeout 60 option sampler-table timeout 60 ! ! flow monitor monitor-ns1-in exporter netscout-1 cache timeout active 60 cache timeout inactive 14 record record-ns-1-in ! ! flow monitor monitor-ns1-out exporter netscout-1 cache timeout active 60 cache timeout inactive 14 record record-ns-1-out ! ! interface GigabitEthernet1/1/1 bandwidth 20000 ip flow monitor monitor-ns1-in input ip flow monitor monitor-ns1-out output ! ! interface GigabitEthernet2/1/1 bandwidth 20000 ip flow monitor monitor-ns1-in input ip flow monitor monitor-ns1-out output