<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Netflow</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/networking/network-protocols/netflow.feed</id>
	<updated>2026-04-11T12:40:22+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/networking/network-protocols/netflow.feed?type=atom"/>
	<entry>
		<title>Bandwidth Detective: Uncover Hidden Traffic and Eliminate Network Bottlenecks</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html"/>
		<published>2026-04-07T14:38:10+10:00</published>
		<updated>2026-04-07T14:38:10+10:00</updated>
		<id>https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/bandwidth-detector/bandwidth_detective-intro.webp&quot; alt=&quot;Bandwidth Detector - Network Analyzer&quot; width=&quot;500&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/bandwidth-detector/01-bandwidth_detective.webp&quot; alt=&quot;Bandwidth Detective - Network Analyzer&quot; width=&quot;200&quot; height=&quot;133&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Bandwidth Detective - Network Analyzer&quot; /&gt;In this article, we explore the core principles of &lt;strong&gt;bandwidth management&lt;/strong&gt; and examine how modern &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;network monitoring technologies&quot;&gt;network monitoring technologies&lt;/a&gt;&lt;/strong&gt; can assist in maintaining &lt;strong&gt;network efficiency&lt;/strong&gt;. In particular, we look at how solutions like &lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer&quot;&gt;NetFlow Analyzer&lt;/a&gt; empower &lt;strong&gt;network administrators&lt;/strong&gt; with detailed &lt;strong&gt;network traffic visibility&lt;/strong&gt;, enabling them to proactively detect anomalies, analyse &lt;strong&gt;bandwidth usage&lt;/strong&gt;, and resolve &lt;strong&gt;network performance issues&lt;/strong&gt; before they impact users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics Covered&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#bandwidth-management&quot; title=&quot;Bandwidth Management with Network Analyzer&quot;&gt;Bandwidth Management with Network Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#bandwidth-traffic-analysis&quot; title=&quot;Bandwidth Traffic Analysis&quot;&gt;Bandwidth Traffic Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#network-forensics&quot; title=&quot;Network Forensics&quot;&gt;Network Forensics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#smart-traffic-management&quot; title=&quot;Smart Traffic Management&quot;&gt;Smart Traffic Management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#proactive-alerts&quot; title=&quot;Proactive Alerts&quot;&gt;Proactive Alerts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#traffic-pattern-analysis&quot; title=&quot;Traffic Pattern Analysis&quot;&gt;Traffic Pattern Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Download&quot;&gt;Get your Bandwidth Detective and start uncovering hidden traffic&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With today’s increasingly complex &lt;strong&gt;network environments&lt;/strong&gt;, managing &lt;strong&gt;network bandwidth&lt;/strong&gt; is no longer optional—it is a critical requirement for ensuring stable and efficient operations. Modern networks support a wide range of applications, from &lt;strong&gt;real-time communications&lt;/strong&gt; and &lt;strong&gt;cloud services&lt;/strong&gt; to large-scale data transfers, all competing for limited resources. Without proper visibility and control, &lt;strong&gt;network congestion&lt;/strong&gt; can quickly lead to degraded performance, poor user experience, and potential business disruption.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Effective &lt;strong&gt;bandwidth management&lt;/strong&gt; enables organisations to prioritise &lt;strong&gt;critical applications&lt;/strong&gt;, prevent unnecessary traffic from consuming valuable resources, and maintain consistent &lt;strong&gt;network performance&lt;/strong&gt; across the infrastructure. By implementing the right &lt;strong&gt;network monitoring tools&lt;/strong&gt; and &lt;strong&gt;traffic analysis solutions&lt;/strong&gt;, administrators can gain deep insight into &lt;strong&gt;traffic patterns&lt;/strong&gt;, identify bottlenecks, and make informed decisions to optimise overall performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Businesses today rely heavily on advanced &lt;strong&gt;network monitoring solutions&lt;/strong&gt; to maintain operational continuity. These tools play a vital role in proactively identifying issues, strengthening &lt;strong&gt;network security&lt;/strong&gt;, ensuring high availability, supporting scalability, and optimising infrastructure costs. Leveraging flow-based technologies such as NetFlow, administrators can achieve granular visibility into &lt;strong&gt;network traffic flows&lt;/strong&gt; and gain the actionable insights required to effectively manage bandwidth in dynamic IT environments.&lt;/p&gt;
</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/bandwidth-detector/bandwidth_detective-intro.webp&quot; alt=&quot;Bandwidth Detector - Network Analyzer&quot; width=&quot;500&quot; height=&quot;300&quot; loading=&quot;lazy&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/bandwidth-detector/01-bandwidth_detective.webp&quot; alt=&quot;Bandwidth Detective - Network Analyzer&quot; width=&quot;200&quot; height=&quot;133&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Bandwidth Detective - Network Analyzer&quot; /&gt;In this article, we explore the core principles of &lt;strong&gt;bandwidth management&lt;/strong&gt; and examine how modern &lt;strong&gt;&lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;network monitoring technologies&quot;&gt;network monitoring technologies&lt;/a&gt;&lt;/strong&gt; can assist in maintaining &lt;strong&gt;network efficiency&lt;/strong&gt;. In particular, we look at how solutions like &lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer&quot;&gt;NetFlow Analyzer&lt;/a&gt; empower &lt;strong&gt;network administrators&lt;/strong&gt; with detailed &lt;strong&gt;network traffic visibility&lt;/strong&gt;, enabling them to proactively detect anomalies, analyse &lt;strong&gt;bandwidth usage&lt;/strong&gt;, and resolve &lt;strong&gt;network performance issues&lt;/strong&gt; before they impact users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics Covered&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#bandwidth-management&quot; title=&quot;Bandwidth Management with Network Analyzer&quot;&gt;Bandwidth Management with Network Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#bandwidth-traffic-analysis&quot; title=&quot;Bandwidth Traffic Analysis&quot;&gt;Bandwidth Traffic Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#network-forensics&quot; title=&quot;Network Forensics&quot;&gt;Network Forensics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#smart-traffic-management&quot; title=&quot;Smart Traffic Management&quot;&gt;Smart Traffic Management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#proactive-alerts&quot; title=&quot;Proactive Alerts&quot;&gt;Proactive Alerts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#traffic-pattern-analysis&quot; title=&quot;Traffic Pattern Analysis&quot;&gt;Traffic Pattern Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/how-to-uncover-hidden-network-traffic.html#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Related Articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-download&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?323274&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Download&quot;&gt;Get your Bandwidth Detective and start uncovering hidden traffic&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With today’s increasingly complex &lt;strong&gt;network environments&lt;/strong&gt;, managing &lt;strong&gt;network bandwidth&lt;/strong&gt; is no longer optional—it is a critical requirement for ensuring stable and efficient operations. Modern networks support a wide range of applications, from &lt;strong&gt;real-time communications&lt;/strong&gt; and &lt;strong&gt;cloud services&lt;/strong&gt; to large-scale data transfers, all competing for limited resources. Without proper visibility and control, &lt;strong&gt;network congestion&lt;/strong&gt; can quickly lead to degraded performance, poor user experience, and potential business disruption.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Effective &lt;strong&gt;bandwidth management&lt;/strong&gt; enables organisations to prioritise &lt;strong&gt;critical applications&lt;/strong&gt;, prevent unnecessary traffic from consuming valuable resources, and maintain consistent &lt;strong&gt;network performance&lt;/strong&gt; across the infrastructure. By implementing the right &lt;strong&gt;network monitoring tools&lt;/strong&gt; and &lt;strong&gt;traffic analysis solutions&lt;/strong&gt;, administrators can gain deep insight into &lt;strong&gt;traffic patterns&lt;/strong&gt;, identify bottlenecks, and make informed decisions to optimise overall performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Businesses today rely heavily on advanced &lt;strong&gt;network monitoring solutions&lt;/strong&gt; to maintain operational continuity. These tools play a vital role in proactively identifying issues, strengthening &lt;strong&gt;network security&lt;/strong&gt;, ensuring high availability, supporting scalability, and optimising infrastructure costs. Leveraging flow-based technologies such as NetFlow, administrators can achieve granular visibility into &lt;strong&gt;network traffic flows&lt;/strong&gt; and gain the actionable insights required to effectively manage bandwidth in dynamic IT environments.&lt;/p&gt;
</content>
		<category term="Netflow" />
	</entry>
	<entry>
		<title>Netflow vs SNMP. Two Different Approaches to Network Monitoring</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html"/>
		<published>2022-03-24T16:11:46+11:00</published>
		<updated>2022-03-24T16:11:46+11:00</updated>
		<id>https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-vs-snmp/netflow-vs-snmp-intro.webp&quot; alt=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-vs-snmp-introduction.jpg&quot; alt=&quot;netflow vs snmp introduction&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow vs snmp introduction&quot; /&gt;SNMP&lt;/strong&gt; (Simple Network Management Protocol) and &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Netflow&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt;&lt;/a&gt; are both popular protocols with admins, prized for their ability to give &lt;strong&gt;visibility over the network&lt;/strong&gt; and in some cases discern the cause of &lt;strong&gt;network performance issues&lt;/strong&gt;, &lt;strong&gt;network bottlenecks&lt;/strong&gt;, &lt;strong&gt;system resource allocation&lt;/strong&gt; issues and more. On the &lt;strong&gt;Netflow&lt;/strong&gt; side of things, third-party software vendors like &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;&lt;strong&gt;ManageEngine&lt;/strong&gt;&lt;/a&gt; can greatly enhance the &lt;strong&gt;usability and capability of the protocol&lt;/strong&gt;, while &lt;strong&gt;SNMP network monitoring&lt;/strong&gt; applications like PRTG, Solarwinds or alternatively open-source &lt;strong&gt;Observium&lt;/strong&gt;, &lt;strong&gt;Nagios&lt;/strong&gt; and &lt;strong&gt;LibreNMS&lt;/strong&gt; take the lead in delivering a comprehensive in-depth &lt;strong&gt;network and system monitoring solution&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unfortunately, however, the close relationship between the two protocols, especially when it comes to software offerings, has birthed some misconceptions. While it’s common to see &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; as more or less interchangeable, there are some &lt;strong&gt;significant and key differences&lt;/strong&gt; between the two that make them suited for very different use cases.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#understanding-snmp&quot; title=&quot;Understanding SNMP and how it works&quot;&gt;Understanding SNMP and how it works&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#understanding-netflow&quot; title=&quot;Understanding Netflow and how it works&quot;&gt;Understanding Netflow and how it works&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-similarities-differences&quot; title=&quot;Netflow vs SNMP: Similarities and differences, using real examples&quot;&gt;Netflow vs SNMP: Similarities and differences, using real examples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-advantages-disadvantages&quot; title=&quot;Netflow vs SNMP: Advantages and disadvantages, using real examples&quot;&gt;Netflow vs SNMP: Advantages and disadvantages, using real examples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#conclusion&quot; title=&quot;Netflow vs SNMP - Conclusion&quot;&gt;Netflow vs SNMP - Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&amp;nbsp;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;understanding-snmp&quot;&gt;Understanding SNMP and How it Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Simple Network Management Protocol&lt;/strong&gt; (&lt;strong&gt;SNMP&lt;/strong&gt;) surfaced as early as 1988, with its roots in its predecessor, the &lt;strong&gt;Simple Gateway Monitoring Protocol&lt;/strong&gt;, which was defined in 1987. &lt;strong&gt;SNMP&lt;/strong&gt; was born out of pure necessity – before its existence, network admins didn’t have much visibility over their infrastructure at all. After the &lt;strong&gt;crash of the ARPAnet,&lt;/strong&gt; on the 27&lt;sup&gt;th&lt;/sup&gt; of October 1980, and as the number of complex components in networks began to snowball, it was clear a solution was needed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, though &lt;strong&gt;SNMP&lt;/strong&gt; was initially built by a group on university researchers as a temporary solution, it quickly evolved, has remained very relevant even today. It’s not considered part of the application layer of the &lt;strong&gt;Internet Protocol Suite&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and exists across three major versions (through SNMPv1 still tends to be the most commonly used).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though SNMP’s name suggests management, it’s more commonly used for the &lt;strong&gt;monitoring&lt;/strong&gt; of different types of &lt;strong&gt;network equipment&lt;/strong&gt;, both on a &lt;strong&gt;network and hardware level&lt;/strong&gt;. Typically, a monitoring server (e.g Nagios, Observium) known as a &lt;strong&gt;SNMP Manager&lt;/strong&gt; monitors devices on the network, with each system holding a software &lt;strong&gt;snmp agent&lt;/strong&gt; that reports information back to the manager:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/how-snmp-works-snmp-components.png&quot; alt=&quot;how snmp works - snmp components&quot; title=&quot;how snmp works - snmp components&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Illustrating how SNMP works&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP&lt;/strong&gt; protocol’s job is to send &lt;strong&gt;Protocol Data Units&lt;/strong&gt; (&lt;strong&gt;PDUs&lt;/strong&gt;) messages to other devices in the network, &lt;strong&gt;requesting information&lt;/strong&gt; via an &lt;strong&gt;SNMP Get-Request&lt;/strong&gt;. The sum of the &lt;strong&gt;Get-Responses&lt;/strong&gt; it receives lets network admins track network events via the data it receives. The speed of this process lets admins keep an eye on a network in almost real-time, which is in many cases invaluable. While the &lt;strong&gt;SNMP query interval&lt;/strong&gt; is customizable in every &lt;strong&gt;SNMP monitoring application&lt;/strong&gt;, it is typically configured to poll the monitored device every 5 minutes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SNMP&lt;/strong&gt; operates on &lt;strong&gt;port 161&lt;/strong&gt; and uses &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;User Datagram Protocol&quot;&gt;UDP&lt;/a&gt;&lt;/strong&gt; as its &lt;strong&gt;transport protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;understanding-netflow&quot;&gt;Understanding Netflow and How It Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though we have covered &lt;strong&gt;Netflow&lt;/strong&gt; extensively in our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow&quot;&gt;Complete Guide to Netflow&lt;/a&gt;, it’s worth quickly brushing over it. The &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Netflow protocol&quot;&gt;Cisco Netflow protocol&lt;/a&gt; is newer than SMNP, beginning its evolution in 1996 with Cisco’s IOS v11.x. Though it was initially designed a software technique, the company soon implemented hardware-based Cisco Netflow solutions in its switches and expanded it to other hardware.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netflow&lt;/strong&gt; consists of &lt;strong&gt;three components&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Netflow Exporter:&lt;/strong&gt; Typically, a router or firewall that gathers packets into flows and exports flow records to collectors when it decides the flow of information has exported.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Netflow Collector: &lt;/strong&gt;A server that receives the aggregated flows and stores and pre-processes them for use by the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Netflow Analyzer&quot;&gt;Netflow Analyzer&lt;/a&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;Netflow Analyzer&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;A software-based solution that provides necessary insights into the data collected, such as &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;ManageEngine&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/how-netflow-works.png&quot; alt=&quot;how netflow works&quot; title=&quot;how netflow works&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Netflow's components: Flow Exporter, Flow Collector and Flow Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, the two protocols (Netflow – SNMP) differ significantly in their technique and makeup, there are some areas they cross over and others where they’re significantly different.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow records&lt;/strong&gt; are exported by the &lt;strong&gt;Flow Exporter&lt;/strong&gt; using the &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;UDP&quot;&gt;UDP&lt;/a&gt; &lt;/strong&gt;transport protocol. Common ports used are &lt;strong&gt;2055&lt;/strong&gt;, &lt;strong&gt;9555&lt;/strong&gt;, &lt;strong&gt;9995&lt;/strong&gt;, &lt;strong&gt;9025&lt;/strong&gt;, &lt;strong&gt;9026&lt;/strong&gt; and are usually configurable. &amp;nbsp;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-similarities-differences&quot;&gt;Netflow vs SNMP: Similarities and Differences, using Real Examples&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As both &lt;strong&gt;Netflow&lt;/strong&gt; and &lt;strong&gt;SNMP&lt;/strong&gt; provide &lt;strong&gt;network monitoring&lt;/strong&gt;, there’s some crossover with the information they provide. Both can give a quick overview of the &lt;strong&gt;bandwidth usage and utilization&lt;/strong&gt; to the end-user, and these days both protocols are supported by all major vendors, though SNMPs age still means it has an advantage in that regard.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, it’s past that the &lt;strong&gt;SNMP protocol&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; begin to diverge. As mentioned earlier, &lt;strong&gt;SNMP provides a real-time overview of the network&lt;/strong&gt;, but Netflow is a little more limited. Though it tends to provide more verbose information, it isn’t live, instead returning data in predetermined intervals that tend to cap out at a couple of minutes at the shorter end. Additionally, &lt;strong&gt;SNMP&lt;/strong&gt; operates in both &lt;strong&gt;push and pull modes&lt;/strong&gt;, while &lt;strong&gt;Netflow is primarily a push technology&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt;, however, is &lt;strong&gt;more compact&lt;/strong&gt; and &lt;strong&gt;delivers more information&lt;/strong&gt; in many areas when compared to the &lt;strong&gt;SNMP protocol&lt;/strong&gt;, which is in many ways quite crude. Unlike SNMP, &lt;strong&gt;Netflow&lt;/strong&gt; can &lt;strong&gt;filter traffic and differentiate bandwidth usage by protocol or IP&lt;/strong&gt;. The enablement of &lt;strong&gt;filtering&lt;/strong&gt; and &lt;strong&gt;differentiation by protocol and application&lt;/strong&gt; gives a &lt;strong&gt;complete overview&lt;/strong&gt; of &lt;strong&gt;link to application utilization&lt;/strong&gt;, while &lt;strong&gt;SNMP is limited to the interface level&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The example below shows how &lt;strong&gt;SNMP&lt;/strong&gt; (top graph) and &lt;strong&gt;Netflow&lt;/strong&gt; (bottom graph) report traffic passing through a monitored interface on a network device (firewall). &amp;nbsp;While both protocols are capable of showing the &lt;strong&gt;overall traffic&lt;/strong&gt; passing through the interface, Netflow provides a &lt;strong&gt;per-application break-down of traffic&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/snmp-vs-netflow-traffic-analysis.png&quot; alt=&quot;snmp vs netflow network traffic analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;snmp vs netflow network traffic analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;em&gt;Comparing SNMP and Netflow network traffic reports from the same source&lt;/em&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When monitoring WAN links within an organisation, it is critical to have the ability to properly analyze traffic. SNMP graphs are simply not enough. In the above example, &lt;strong&gt;ManageEngine’s Netflow&lt;/strong&gt; shows the &lt;strong&gt;bittorrent&lt;/strong&gt; application responsible for a large portion of the bandwidth used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An unexpected spike in traffic can signal problems, a security issue or even a breach in the company’s IT policies. This example highlights an important difference between SNMP and Netflow when used to monitor traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The knock-on effect of this is that &lt;strong&gt;Netflow&lt;/strong&gt; tends to be more difficult to setup. Most of the time, getting netflow configured can be somewhat tricky depending on the device and netflow version supported. Its verbosity also means it can be more intensive and require more bandwidth than SNMP depending on the amount of traffic passing through the monitored links, however with today’s high-bandwidth links this shouldn’t be of any real concern.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite this, there is an area where SNMP provides information where Netflow doesn’t – hardware. SNMP is capable of monitoring CPU, memory, disk space, temperature for devices, and more, something Netflow has only been able to do so far in proof of concepts.&lt;/p&gt;
&lt;p&gt;The below screenshot is an example of an SNMP-monitored &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto Next-Gen Firewall&quot;&gt;Palo Alto Next-Gen Firewall&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/firewall-overview-monitoring-via-snmp.png&quot; alt=&quot;Palo firewall overview monitoring via snmp&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Palo firewall overview monitoring via snmp&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Monitoring a Palo Alto Next-Gen Firewall via SNMP&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our SNMP monitoring server is configured to poll the firewall every 5 minutes and pull a significant amount of information that includes internal bandwidth usage, CPU, memory and storage usage, temperature, event logs and more.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-advantages-disadvantages&quot;&gt;Netflow vs SNMP: Advantages and Disadvantages, using Real Examples&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It should be evident that each protocol has different use cases but they also complement each other. When it comes to analyzing traffic information, &lt;strong&gt;Netflow&lt;/strong&gt; is clearly the winner, and it also scales better on the high-traffic networks that professionals are more likely to see.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Netflow’s ability to &lt;strong&gt;differentiate&lt;/strong&gt; and filter by &lt;strong&gt;protocol&lt;/strong&gt; or &lt;strong&gt;application&lt;/strong&gt; means network security professionals can determine which end system is using excessive bandwidth but also assist identifying possible security threats.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below screenshot, taken from &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine’s Netflow Analyzer&quot;&gt;ManageEngine’s Netflow Analyzer&lt;/a&gt;, is a great example on how &lt;strong&gt;Netflow&lt;/strong&gt; can assist in &lt;strong&gt;identifying abnormal&amp;nbsp; traffic patterns&lt;/strong&gt;, including &lt;strong&gt;malformed packets&lt;/strong&gt;, &lt;strong&gt;excessive flows&lt;/strong&gt; and more:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-manageengine-security-threats.png&quot; alt=&quot;netflow manageengine security threats&quot; /&gt;&lt;br /&gt; ManageEngine's Netflow security threats interface&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In practice, this means you can utilize &lt;strong&gt;Netflow&lt;/strong&gt; to monitor specific aspects like voice and video quality across a network, something just not possible with SNMP. This includes link &lt;strong&gt;latency&lt;/strong&gt;, &lt;strong&gt;jitter&lt;/strong&gt;, &lt;strong&gt;call path availability&lt;/strong&gt; and other important metrics.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The verbose data also better lends its hand to reporting, which can then be used for network planning or other considerations. For example, you can quickly produce capacity planning reports, get an accurate overview of trends over a long period, and measure bandwidth growth over time. It can also recognise even non-standard applications or those who use dynamic port numbers.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-manageengine-capacity-planning.png&quot; alt=&quot;netflow manageengine capacity planning&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow manageengine capacity planning&quot; /&gt;Capacity planning with ManageEngine&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP protocol’s main advantage&lt;/strong&gt; is that it is supported widely by almost every type of device that connects to the network and is capable of delivering strong, basic traffic visibility with very low overhead. It can provide efficient quantitative information, including bandwidth, but also &lt;strong&gt;detailed system resource usage:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-monitoring-large.png&quot; class=&quot;jcepopup&quot; title=&quot;SNMP monitoring of an ESXi host&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SNMP monitoring of an ESXi host&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-monitoring-small.png&quot; alt=&quot;esxi server resource monitoring&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;esxi server resource monitoring&quot; /&gt;&lt;/a&gt;SNMP monitoring of an ESXi host (click to enlarge)&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above example, our SNMP monitored host is a lab ESXi server with its &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to enable SNMP Service on ESXi&quot;&gt;SNMP service enabled&lt;/a&gt;. The amount of information obtained by SNMP is impressive and detailed: Server information, model number, operating system, port utilization, memory and storage usage, CPU usage and more, are tracked and updated every 5 minutes.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Drilling into further detail, e.g &lt;strong&gt;CPU usage&lt;/strong&gt;, is simple as hovering on-top of the CPU, allowing a pop-up embedded window appear, revealing each core usage over time:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-cpu-monitoring-large.png&quot; class=&quot;jcepopup&quot; title=&quot;SNMP monitoring of an ESXi host’s CPU&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SNMP monitoring of an ESXi host’s CPU&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-cpu-monitoring-small.png&quot; alt=&quot;esxi server resource cpu monitoring&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;esxi server resource cpu monitoring&quot; /&gt;&lt;/a&gt;SNMP monitoring of an ESXi's host CPU (click to enlarge)&amp;nbsp;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Combining this information with automated alerts, makes SNMP monitoring a powerful tool that cannot however be replaced by Netflow.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;conclusion&quot;&gt;Conclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow protocol&lt;/strong&gt; are both standards for a reason. They both have their &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt;, and generally both can be used simultaneously to monitor different aspects of a network and its critical devices. Netflow’s aid in network planning and traffic analysis makes it, in many cases, the more helpful tool to network administrators. On the other hand, SNMP’s capabilities to provide &lt;strong&gt;overall traffic graphs&lt;/strong&gt; and &lt;strong&gt;detailed resource usage&lt;/strong&gt;, make it a favourite for system administrators.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Third-party advanced tools like &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;&lt;strong&gt;ManageEngine&lt;/strong&gt;&lt;/a&gt; combine the best of both &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; by monitoring every aspect of the network in a simple yet information packed-UI and enabling monitoring of &lt;strong&gt;traffic shaping technologies&lt;/strong&gt;, &lt;strong&gt;security alerts&lt;/strong&gt;, &lt;strong&gt;SLAs&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though those interested in &lt;strong&gt;networking&lt;/strong&gt; and &lt;strong&gt;system administration&lt;/strong&gt; should naturally try both &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow tools&lt;/strong&gt; for themselves, no regrets will be found after taking the time to utilize Netflow and its more diverse functionality.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-vs-snmp/netflow-vs-snmp-intro.webp&quot; alt=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-vs-snmp-introduction.jpg&quot; alt=&quot;netflow vs snmp introduction&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow vs snmp introduction&quot; /&gt;SNMP&lt;/strong&gt; (Simple Network Management Protocol) and &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Netflow&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt;&lt;/a&gt; are both popular protocols with admins, prized for their ability to give &lt;strong&gt;visibility over the network&lt;/strong&gt; and in some cases discern the cause of &lt;strong&gt;network performance issues&lt;/strong&gt;, &lt;strong&gt;network bottlenecks&lt;/strong&gt;, &lt;strong&gt;system resource allocation&lt;/strong&gt; issues and more. On the &lt;strong&gt;Netflow&lt;/strong&gt; side of things, third-party software vendors like &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;&lt;strong&gt;ManageEngine&lt;/strong&gt;&lt;/a&gt; can greatly enhance the &lt;strong&gt;usability and capability of the protocol&lt;/strong&gt;, while &lt;strong&gt;SNMP network monitoring&lt;/strong&gt; applications like PRTG, Solarwinds or alternatively open-source &lt;strong&gt;Observium&lt;/strong&gt;, &lt;strong&gt;Nagios&lt;/strong&gt; and &lt;strong&gt;LibreNMS&lt;/strong&gt; take the lead in delivering a comprehensive in-depth &lt;strong&gt;network and system monitoring solution&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unfortunately, however, the close relationship between the two protocols, especially when it comes to software offerings, has birthed some misconceptions. While it’s common to see &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; as more or less interchangeable, there are some &lt;strong&gt;significant and key differences&lt;/strong&gt; between the two that make them suited for very different use cases.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#understanding-snmp&quot; title=&quot;Understanding SNMP and how it works&quot;&gt;Understanding SNMP and how it works&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#understanding-netflow&quot; title=&quot;Understanding Netflow and how it works&quot;&gt;Understanding Netflow and how it works&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-similarities-differences&quot; title=&quot;Netflow vs SNMP: Similarities and differences, using real examples&quot;&gt;Netflow vs SNMP: Similarities and differences, using real examples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-advantages-disadvantages&quot; title=&quot;Netflow vs SNMP: Advantages and disadvantages, using real examples&quot;&gt;Netflow vs SNMP: Advantages and disadvantages, using real examples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#conclusion&quot; title=&quot;Netflow vs SNMP - Conclusion&quot;&gt;Netflow vs SNMP - Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&amp;nbsp;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;understanding-snmp&quot;&gt;Understanding SNMP and How it Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Simple Network Management Protocol&lt;/strong&gt; (&lt;strong&gt;SNMP&lt;/strong&gt;) surfaced as early as 1988, with its roots in its predecessor, the &lt;strong&gt;Simple Gateway Monitoring Protocol&lt;/strong&gt;, which was defined in 1987. &lt;strong&gt;SNMP&lt;/strong&gt; was born out of pure necessity – before its existence, network admins didn’t have much visibility over their infrastructure at all. After the &lt;strong&gt;crash of the ARPAnet,&lt;/strong&gt; on the 27&lt;sup&gt;th&lt;/sup&gt; of October 1980, and as the number of complex components in networks began to snowball, it was clear a solution was needed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, though &lt;strong&gt;SNMP&lt;/strong&gt; was initially built by a group on university researchers as a temporary solution, it quickly evolved, has remained very relevant even today. It’s not considered part of the application layer of the &lt;strong&gt;Internet Protocol Suite&lt;/strong&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI model&quot;&gt;OSI model&lt;/a&gt; and exists across three major versions (through SNMPv1 still tends to be the most commonly used).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though SNMP’s name suggests management, it’s more commonly used for the &lt;strong&gt;monitoring&lt;/strong&gt; of different types of &lt;strong&gt;network equipment&lt;/strong&gt;, both on a &lt;strong&gt;network and hardware level&lt;/strong&gt;. Typically, a monitoring server (e.g Nagios, Observium) known as a &lt;strong&gt;SNMP Manager&lt;/strong&gt; monitors devices on the network, with each system holding a software &lt;strong&gt;snmp agent&lt;/strong&gt; that reports information back to the manager:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/how-snmp-works-snmp-components.png&quot; alt=&quot;how snmp works - snmp components&quot; title=&quot;how snmp works - snmp components&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Illustrating how SNMP works&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP&lt;/strong&gt; protocol’s job is to send &lt;strong&gt;Protocol Data Units&lt;/strong&gt; (&lt;strong&gt;PDUs&lt;/strong&gt;) messages to other devices in the network, &lt;strong&gt;requesting information&lt;/strong&gt; via an &lt;strong&gt;SNMP Get-Request&lt;/strong&gt;. The sum of the &lt;strong&gt;Get-Responses&lt;/strong&gt; it receives lets network admins track network events via the data it receives. The speed of this process lets admins keep an eye on a network in almost real-time, which is in many cases invaluable. While the &lt;strong&gt;SNMP query interval&lt;/strong&gt; is customizable in every &lt;strong&gt;SNMP monitoring application&lt;/strong&gt;, it is typically configured to poll the monitored device every 5 minutes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;SNMP&lt;/strong&gt; operates on &lt;strong&gt;port 161&lt;/strong&gt; and uses &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;User Datagram Protocol&quot;&gt;UDP&lt;/a&gt;&lt;/strong&gt; as its &lt;strong&gt;transport protocol&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;understanding-netflow&quot;&gt;Understanding Netflow and How It Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though we have covered &lt;strong&gt;Netflow&lt;/strong&gt; extensively in our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow&quot;&gt;Complete Guide to Netflow&lt;/a&gt;, it’s worth quickly brushing over it. The &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Cisco Netflow protocol&quot;&gt;Cisco Netflow protocol&lt;/a&gt; is newer than SMNP, beginning its evolution in 1996 with Cisco’s IOS v11.x. Though it was initially designed a software technique, the company soon implemented hardware-based Cisco Netflow solutions in its switches and expanded it to other hardware.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netflow&lt;/strong&gt; consists of &lt;strong&gt;three components&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Netflow Exporter:&lt;/strong&gt; Typically, a router or firewall that gathers packets into flows and exports flow records to collectors when it decides the flow of information has exported.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Netflow Collector: &lt;/strong&gt;A server that receives the aggregated flows and stores and pre-processes them for use by the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Netflow Analyzer&quot;&gt;Netflow Analyzer&lt;/a&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;Netflow Analyzer&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;A software-based solution that provides necessary insights into the data collected, such as &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;ManageEngine&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;strong&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/how-netflow-works.png&quot; alt=&quot;how netflow works&quot; title=&quot;how netflow works&quot; /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Netflow's components: Flow Exporter, Flow Collector and Flow Analyzer&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you can see, the two protocols (Netflow – SNMP) differ significantly in their technique and makeup, there are some areas they cross over and others where they’re significantly different.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow records&lt;/strong&gt; are exported by the &lt;strong&gt;Flow Exporter&lt;/strong&gt; using the &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; title=&quot;UDP&quot;&gt;UDP&lt;/a&gt; &lt;/strong&gt;transport protocol. Common ports used are &lt;strong&gt;2055&lt;/strong&gt;, &lt;strong&gt;9555&lt;/strong&gt;, &lt;strong&gt;9995&lt;/strong&gt;, &lt;strong&gt;9025&lt;/strong&gt;, &lt;strong&gt;9026&lt;/strong&gt; and are usually configurable. &amp;nbsp;&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-similarities-differences&quot;&gt;Netflow vs SNMP: Similarities and Differences, using Real Examples&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As both &lt;strong&gt;Netflow&lt;/strong&gt; and &lt;strong&gt;SNMP&lt;/strong&gt; provide &lt;strong&gt;network monitoring&lt;/strong&gt;, there’s some crossover with the information they provide. Both can give a quick overview of the &lt;strong&gt;bandwidth usage and utilization&lt;/strong&gt; to the end-user, and these days both protocols are supported by all major vendors, though SNMPs age still means it has an advantage in that regard.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, it’s past that the &lt;strong&gt;SNMP protocol&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; begin to diverge. As mentioned earlier, &lt;strong&gt;SNMP provides a real-time overview of the network&lt;/strong&gt;, but Netflow is a little more limited. Though it tends to provide more verbose information, it isn’t live, instead returning data in predetermined intervals that tend to cap out at a couple of minutes at the shorter end. Additionally, &lt;strong&gt;SNMP&lt;/strong&gt; operates in both &lt;strong&gt;push and pull modes&lt;/strong&gt;, while &lt;strong&gt;Netflow is primarily a push technology&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt;, however, is &lt;strong&gt;more compact&lt;/strong&gt; and &lt;strong&gt;delivers more information&lt;/strong&gt; in many areas when compared to the &lt;strong&gt;SNMP protocol&lt;/strong&gt;, which is in many ways quite crude. Unlike SNMP, &lt;strong&gt;Netflow&lt;/strong&gt; can &lt;strong&gt;filter traffic and differentiate bandwidth usage by protocol or IP&lt;/strong&gt;. The enablement of &lt;strong&gt;filtering&lt;/strong&gt; and &lt;strong&gt;differentiation by protocol and application&lt;/strong&gt; gives a &lt;strong&gt;complete overview&lt;/strong&gt; of &lt;strong&gt;link to application utilization&lt;/strong&gt;, while &lt;strong&gt;SNMP is limited to the interface level&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The example below shows how &lt;strong&gt;SNMP&lt;/strong&gt; (top graph) and &lt;strong&gt;Netflow&lt;/strong&gt; (bottom graph) report traffic passing through a monitored interface on a network device (firewall). &amp;nbsp;While both protocols are capable of showing the &lt;strong&gt;overall traffic&lt;/strong&gt; passing through the interface, Netflow provides a &lt;strong&gt;per-application break-down of traffic&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/snmp-vs-netflow-traffic-analysis.png&quot; alt=&quot;snmp vs netflow network traffic analysis&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;snmp vs netflow network traffic analysis&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;em&gt;Comparing SNMP and Netflow network traffic reports from the same source&lt;/em&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When monitoring WAN links within an organisation, it is critical to have the ability to properly analyze traffic. SNMP graphs are simply not enough. In the above example, &lt;strong&gt;ManageEngine’s Netflow&lt;/strong&gt; shows the &lt;strong&gt;bittorrent&lt;/strong&gt; application responsible for a large portion of the bandwidth used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An unexpected spike in traffic can signal problems, a security issue or even a breach in the company’s IT policies. This example highlights an important difference between SNMP and Netflow when used to monitor traffic.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The knock-on effect of this is that &lt;strong&gt;Netflow&lt;/strong&gt; tends to be more difficult to setup. Most of the time, getting netflow configured can be somewhat tricky depending on the device and netflow version supported. Its verbosity also means it can be more intensive and require more bandwidth than SNMP depending on the amount of traffic passing through the monitored links, however with today’s high-bandwidth links this shouldn’t be of any real concern.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite this, there is an area where SNMP provides information where Netflow doesn’t – hardware. SNMP is capable of monitoring CPU, memory, disk space, temperature for devices, and more, something Netflow has only been able to do so far in proof of concepts.&lt;/p&gt;
&lt;p&gt;The below screenshot is an example of an SNMP-monitored &lt;a href=&quot;https://www.firewall.cx/security/palo-alto-networks.html&quot; target=&quot;_blank&quot; title=&quot;Palo Alto Next-Gen Firewall&quot;&gt;Palo Alto Next-Gen Firewall&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/firewall-overview-monitoring-via-snmp.png&quot; alt=&quot;Palo firewall overview monitoring via snmp&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Palo firewall overview monitoring via snmp&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Monitoring a Palo Alto Next-Gen Firewall via SNMP&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our SNMP monitoring server is configured to poll the firewall every 5 minutes and pull a significant amount of information that includes internal bandwidth usage, CPU, memory and storage usage, temperature, event logs and more.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-advantages-disadvantages&quot;&gt;Netflow vs SNMP: Advantages and Disadvantages, using Real Examples&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It should be evident that each protocol has different use cases but they also complement each other. When it comes to analyzing traffic information, &lt;strong&gt;Netflow&lt;/strong&gt; is clearly the winner, and it also scales better on the high-traffic networks that professionals are more likely to see.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Netflow’s ability to &lt;strong&gt;differentiate&lt;/strong&gt; and filter by &lt;strong&gt;protocol&lt;/strong&gt; or &lt;strong&gt;application&lt;/strong&gt; means network security professionals can determine which end system is using excessive bandwidth but also assist identifying possible security threats.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The below screenshot, taken from &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine’s Netflow Analyzer&quot;&gt;ManageEngine’s Netflow Analyzer&lt;/a&gt;, is a great example on how &lt;strong&gt;Netflow&lt;/strong&gt; can assist in &lt;strong&gt;identifying abnormal&amp;nbsp; traffic patterns&lt;/strong&gt;, including &lt;strong&gt;malformed packets&lt;/strong&gt;, &lt;strong&gt;excessive flows&lt;/strong&gt; and more:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-manageengine-security-threats.png&quot; alt=&quot;netflow manageengine security threats&quot; /&gt;&lt;br /&gt; ManageEngine's Netflow security threats interface&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In practice, this means you can utilize &lt;strong&gt;Netflow&lt;/strong&gt; to monitor specific aspects like voice and video quality across a network, something just not possible with SNMP. This includes link &lt;strong&gt;latency&lt;/strong&gt;, &lt;strong&gt;jitter&lt;/strong&gt;, &lt;strong&gt;call path availability&lt;/strong&gt; and other important metrics.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The verbose data also better lends its hand to reporting, which can then be used for network planning or other considerations. For example, you can quickly produce capacity planning reports, get an accurate overview of trends over a long period, and measure bandwidth growth over time. It can also recognise even non-standard applications or those who use dynamic port numbers.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/netflow-manageengine-capacity-planning.png&quot; alt=&quot;netflow manageengine capacity planning&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow manageengine capacity planning&quot; /&gt;Capacity planning with ManageEngine&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP protocol’s main advantage&lt;/strong&gt; is that it is supported widely by almost every type of device that connects to the network and is capable of delivering strong, basic traffic visibility with very low overhead. It can provide efficient quantitative information, including bandwidth, but also &lt;strong&gt;detailed system resource usage:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-monitoring-large.png&quot; class=&quot;jcepopup&quot; title=&quot;SNMP monitoring of an ESXi host&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SNMP monitoring of an ESXi host&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-monitoring-small.png&quot; alt=&quot;esxi server resource monitoring&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;esxi server resource monitoring&quot; /&gt;&lt;/a&gt;SNMP monitoring of an ESXi host (click to enlarge)&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above example, our SNMP monitored host is a lab ESXi server with its &lt;a href=&quot;https://www.firewall.cx/operating-systems/virtualization-vm-backup/how-to-enable-snmp-on-vmware-esxi.html&quot; target=&quot;_blank&quot; title=&quot;How to enable SNMP Service on ESXi&quot;&gt;SNMP service enabled&lt;/a&gt;. The amount of information obtained by SNMP is impressive and detailed: Server information, model number, operating system, port utilization, memory and storage usage, CPU usage and more, are tracked and updated every 5 minutes.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Drilling into further detail, e.g &lt;strong&gt;CPU usage&lt;/strong&gt;, is simple as hovering on-top of the CPU, allowing a pop-up embedded window appear, revealing each core usage over time:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-cpu-monitoring-large.png&quot; class=&quot;jcepopup&quot; title=&quot;SNMP monitoring of an ESXi host’s CPU&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;SNMP monitoring of an ESXi host’s CPU&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-vs-snmp/esxi-server-resource-cpu-monitoring-small.png&quot; alt=&quot;esxi server resource cpu monitoring&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;esxi server resource cpu monitoring&quot; /&gt;&lt;/a&gt;SNMP monitoring of an ESXi's host CPU (click to enlarge)&amp;nbsp;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Combining this information with automated alerts, makes SNMP monitoring a powerful tool that cannot however be replaced by Netflow.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;conclusion&quot;&gt;Conclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow protocol&lt;/strong&gt; are both standards for a reason. They both have their &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt;, and generally both can be used simultaneously to monitor different aspects of a network and its critical devices. Netflow’s aid in network planning and traffic analysis makes it, in many cases, the more helpful tool to network administrators. On the other hand, SNMP’s capabilities to provide &lt;strong&gt;overall traffic graphs&lt;/strong&gt; and &lt;strong&gt;detailed resource usage&lt;/strong&gt;, make it a favourite for system administrators.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Third-party advanced tools like &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;ManageEngine&quot;&gt;&lt;strong&gt;ManageEngine&lt;/strong&gt;&lt;/a&gt; combine the best of both &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; by monitoring every aspect of the network in a simple yet information packed-UI and enabling monitoring of &lt;strong&gt;traffic shaping technologies&lt;/strong&gt;, &lt;strong&gt;security alerts&lt;/strong&gt;, &lt;strong&gt;SLAs&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Though those interested in &lt;strong&gt;networking&lt;/strong&gt; and &lt;strong&gt;system administration&lt;/strong&gt; should naturally try both &lt;strong&gt;SNMP&lt;/strong&gt; and &lt;strong&gt;Netflow tools&lt;/strong&gt; for themselves, no regrets will be found after taking the time to utilize Netflow and its more diverse functionality.&lt;/p&gt;</content>
		<category term="Netflow" />
	</entry>
	<entry>
		<title>Complete Guide to Netflow: How Netflow &amp; its Components Work. Netflow Monitoring Tools</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html"/>
		<published>2020-05-19T17:40:05+10:00</published>
		<updated>2020-05-19T17:40:05+10:00</updated>
		<id>https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-basics-components-tools/netflow-basics-netflow-components-rfc-history-intro.webp&quot; alt=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This article will cover the &lt;strong&gt;basics&lt;/strong&gt; of &lt;strong&gt;Netflow&lt;/strong&gt;, including its use cases, &lt;strong&gt;Netflow supported devices&lt;/strong&gt;, &lt;strong&gt;Netflow history&lt;/strong&gt;, and variants. We’ll also dive into the technical details of &lt;strong&gt;how the Netflow protocol works&lt;/strong&gt;, including the &lt;strong&gt;Netflow ports&lt;/strong&gt;, and the &lt;strong&gt;various Netflow versions&lt;/strong&gt;. This will lead onto coverage of the various &lt;strong&gt;Netflow components&lt;/strong&gt;, including the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;strong&gt;Netflow Analyzer&lt;/strong&gt;, with some brief coverage of its main competition.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#introduction-to-netflow-what-is-netflow-used-for&quot; title=&quot;Introduction to Netflow: What is Netflow used for?&quot;&gt;Introduction to Netflow: What is Netflow used for?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-history-rfc-netflow-vendor-variants&quot; target=&quot;_self&quot; title=&quot;Netflow History, RFC, Netflow Vendor Variants&quot;&gt;Netflow History, RFC, Netflow Vendor Variants&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-protocol-transport-and-ports-what-can-i-see-with-netflow&quot; title=&quot;Netflow Protocol Transport and Ports. What can I see with Netflow?&quot;&gt;Netflow Protocol Transport and Ports. What can I see with Netflow?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-components-netflow-exporter-netflow-collector-and-network-analyzer&quot; title=&quot;Netflow Components: Netflow Exporter, Netflow Collector and Netflow Analyzer&quot;&gt;Netflow Components: Netflow Exporter, Netflow Collector and Netflow Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-what-are-the-differences&quot; title=&quot;Netflow vs SNMP – What are the Differences?&quot;&gt;Netflow vs SNMP – What are the Differences?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-ipfix-what-are-the-differences&quot; title=&quot;Netflow vs IPFix – What are the Differences?&quot;&gt;Netflow vs IPFix – What are the Differences?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;a href=&quot;https://www.firewall.cx/networking-topics/protocols/netflow/1234-netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;introduction-to-netflow-what-is-netflow-used-for&quot;&gt;Introduction to Netflow – What is Netflow Used for?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Visibility&lt;/strong&gt; plays a key role in the &lt;strong&gt;maintenance and security&lt;/strong&gt; of any network. With it, admins can &lt;strong&gt;identify issues&lt;/strong&gt;, &lt;strong&gt;discover non-compliant users&lt;/strong&gt;, refine their provisioning, and more. &lt;strong&gt;Netflow&lt;/strong&gt; is a protocol developed by &lt;strong&gt;CISCO&lt;/strong&gt; that fulfils this purpose, letting interested parties understand &lt;strong&gt;network patterns&lt;/strong&gt; and &lt;strong&gt;protocol distribution&lt;/strong&gt;, while supporting more granular data like &lt;strong&gt;IP service type&lt;/strong&gt; for diagnosis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Its relatively &lt;strong&gt;low overhead&lt;/strong&gt; and &lt;strong&gt;trusted history&lt;/strong&gt; means that &lt;strong&gt;Netflow&lt;/strong&gt; is still around in some forms a decade after its release. As well as &lt;strong&gt;user and application monitoring&lt;/strong&gt;, admins utilize &lt;strong&gt;Netflow&lt;/strong&gt; for &lt;strong&gt;network planning&lt;/strong&gt;, &lt;strong&gt;application reporting and profiling&lt;/strong&gt;, &lt;strong&gt;security analysis&lt;/strong&gt;, and &lt;strong&gt;usage-based reporting and billing&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/cisco-netflow-router-cache.png&quot; alt=&quot;cisco netflow router cache&quot; id=&quot;cisco netflow router cache&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;cisco netflow router cache&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Broadly, a &lt;strong&gt;flow&lt;/strong&gt; is a &lt;strong&gt;group of packets&lt;/strong&gt; part of the &lt;strong&gt;same conversation&lt;/strong&gt; between &lt;strong&gt;two endpoints&lt;/strong&gt; in a network. More technically, a &lt;strong&gt;single flow&lt;/strong&gt; is defined by its &lt;strong&gt;5-tuple&lt;/strong&gt;, a &lt;strong&gt;collection&lt;/strong&gt; of &lt;strong&gt;five data points&lt;/strong&gt; that include:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Source and destination IPs addresses&lt;/li&gt;
&lt;li&gt;Source and destination ports&lt;/li&gt;
&lt;li&gt;The protocol&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you’d expect, the Cisco-developed protocol is supported by a number of CISCO networking devices. The company’s &lt;strong&gt;IOS-XR routers&lt;/strong&gt; use a software implementation running on line card CPU, while the IOS line runs software on route processor. Meanwhile, &lt;strong&gt;Catalyst&lt;/strong&gt; and &lt;strong&gt;Nexus switches&lt;/strong&gt; have a dedicated hardware &lt;strong&gt;TCAM&lt;/strong&gt; implementation, generally supporting more flows.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-history-rfc-netflow-vendor-variants&quot;&gt;Netflow History, RFC, Netflow Vendor Variants&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Of course, Cisco isn’t the sole vendor of devices with &lt;strong&gt;Netflow-like&lt;/strong&gt; support. &lt;strong&gt;Netflow&lt;/strong&gt; began its evolution in &lt;strong&gt;1996&lt;/strong&gt; with &lt;strong&gt;IOS 11.x&lt;/strong&gt; as a software technique, rather than a hardware one. Initially, it was designed for LAN and scaled poorly, resulting in the rise of the &lt;strong&gt;express forwarding&lt;/strong&gt; technique. Cisco, seemingly recognising the value of its solution, later &lt;strong&gt;enabled hardware-based implementations&lt;/strong&gt;, which allow for higher bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, with the rise of &lt;strong&gt;Netflow&lt;/strong&gt; came a number of other popular vendors trying to cash in on it. In a bid to avoid trademark battles, various competitors implemented their own flavors of the technique. &lt;strong&gt;Juniper’s jflow&lt;/strong&gt; is one such example, as well as &lt;strong&gt;Huawei’s NetStream&lt;/strong&gt;, and&lt;strong&gt; HP’s SFlow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the various solutions complicating matters, the &lt;strong&gt;IETF&lt;/strong&gt; released &lt;strong&gt;IPFIX&lt;/strong&gt; as the &lt;strong&gt;official standard&lt;/strong&gt; in 2008. Making matters more confusing, &lt;strong&gt;IPFIX&lt;/strong&gt; is sometimes &lt;strong&gt;referred&lt;/strong&gt; to as &lt;strong&gt;Netflow v10&lt;/strong&gt;. In reality, the latest &lt;strong&gt;official version&lt;/strong&gt; of &lt;strong&gt;Netflow&lt;/strong&gt; is &lt;strong&gt;v9&lt;/strong&gt;, with IPFIX simply bearing some similarities. &lt;strong&gt;Netflow version 9&lt;/strong&gt; is described in &lt;a href=&quot;https://tools.ietf.org/html/rfc3954&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;RFC 3954&quot; title=&quot;RFC 3954&quot;&gt;RFC 3954&lt;/a&gt; on the informational track rather than standards. &lt;strong&gt;IPFIX&lt;/strong&gt; is on the standards track with &lt;a href=&quot;https://tools.ietf.org/html/rfc7012&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;RFC 7012&quot; title=&quot;RFC 7012&quot;&gt;RFC 7012&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt; is generally supported in &lt;strong&gt;three versions&lt;/strong&gt;. Cisco did not publicly release versions 2-4, and v1 is naturally obsolete. Routers and switches most commonly support &lt;strong&gt;Netflow v5&lt;/strong&gt;, &lt;strong&gt;v8&lt;/strong&gt;, and &lt;strong&gt;v9&lt;/strong&gt;, with v6 out of support and v7 seemingly exclusive to Catalyst 5K series switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow records&lt;/strong&gt; are &lt;strong&gt;exported&lt;/strong&gt; via &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; id=&quot;UDP&quot; title=&quot;UDP&quot;&gt;&lt;strong&gt;UDP&lt;/strong&gt;&lt;/a&gt; and received by the &lt;strong&gt;Netflow Collector&lt;/strong&gt;, which we’ll dive into more later. Suffice it to say that the &lt;strong&gt;IP address of the collector&lt;/strong&gt; and the &lt;strong&gt;UDP destination port&lt;/strong&gt; must be configured on the sending router, with the most common &lt;strong&gt;port&lt;/strong&gt; being &lt;strong&gt;UDP 2055&lt;/strong&gt;. Some Netflow implementations protect against packet loss through use of &lt;strong&gt;SCTP&lt;/strong&gt;, however, this is not always performant if multiple independent collectors are in play.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-protocol-transport-and-ports-what-can-i-see-with-netflow&quot;&gt;Netflow Protocol Transport and Ports. What Can I See with Netflow?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, a &lt;strong&gt;Netflow enabled device&lt;/strong&gt; inspects a number of parameters to define differentiate flows. These provide some natural, basic visibility. The &lt;strong&gt;source&lt;/strong&gt; and &lt;strong&gt;destination addresses&lt;/strong&gt; can tell admins who is &lt;strong&gt;sending&lt;/strong&gt; and &lt;strong&gt;receiving traffic&lt;/strong&gt;, for example.&amp;nbsp; The &lt;strong&gt;ports&lt;/strong&gt; show which &lt;strong&gt;applications&lt;/strong&gt; are utilizing the traffic, &lt;strong&gt;class of service&lt;/strong&gt; indicates the priority, and the &lt;strong&gt;interface&lt;/strong&gt; how traffic is being utilized by the device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, the collection of various data points can lead to information beyond this. Tailed packets and bytes reveal the amount of traffic, and can be combined with data like timestamps for bytes per second, TCP flags to examine handshakes, subnet mask for prefix calculation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The amount of real-world benefit often depends on the analysis tools at your disposal. With the right &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;, admins can use collected data to determine the following:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;General traffic patterns&lt;/li&gt;
&lt;li&gt;Diagnosis of slow performance, including network bottlenecks&lt;/li&gt;
&lt;li&gt;Unusual network behaviour&lt;/li&gt;
&lt;li&gt;The network impact of certain applications&lt;/li&gt;
&lt;li&gt;Unauthorized WAN traffic, unusual network behaviour such as DoS&lt;/li&gt;
&lt;li&gt;QoS validation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;netflow-components-netflow-exporter-netflow-collector-and-network-analyzer&quot;&gt;Netflow Components: Netflow Exporter, Netflow Collector and Network Analyzer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To fully understand &lt;strong&gt;Netflow&lt;/strong&gt;, it’s necessary to have an idea of its various components and how they function. It consists of &lt;strong&gt;three components&lt;/strong&gt;: the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;. Each of these has a different role, and is often based on different hardware.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/how-netflow-works.png&quot; alt=&quot;how netflow works&quot; id=&quot;how netflow works&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;how netflow works&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These are fairly self-explanatory. The &lt;strong&gt;Netflow Exporter&lt;/strong&gt; is an &lt;strong&gt;appliance&lt;/strong&gt; or &lt;strong&gt;network device&lt;/strong&gt;, an example device is a &lt;strong&gt;router&lt;/strong&gt; or &lt;strong&gt;firewall&lt;/strong&gt;. It gathers packets into &lt;strong&gt;flows&lt;/strong&gt; and &lt;strong&gt;exports flow records&lt;/strong&gt; to &lt;strong&gt;collectors&lt;/strong&gt; when it decides the flow expires.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Netflow Exporter&lt;/strong&gt; determines which flows are new by the &lt;strong&gt;5-tuple data points&lt;/strong&gt; mentioned above. When packets enter the network, they’re checked against a table of recent flows called the flow cache. If the packet matches an existing &lt;strong&gt;5-tuple&lt;/strong&gt;, information such as packet count and byte length for the flow is updated. If not, a new entry is created.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router &lt;strong&gt;expires flows&lt;/strong&gt;, &lt;strong&gt;exports them&lt;/strong&gt;, and &lt;strong&gt;removes them&lt;/strong&gt; from the &lt;strong&gt;cache&lt;/strong&gt;. It takes indications from &lt;strong&gt;TCP flags&lt;/strong&gt;, such as &lt;strong&gt;FIN&lt;/strong&gt; or &lt;strong&gt;RST&lt;/strong&gt;, or when one of two requirements are met:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;In an inactive timeout&lt;/strong&gt;, flows expire when no packets have been detected in a set period. The default for this is usually fifteen seconds, but it can be adjusted to a network’s needs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;An active timeout &lt;/strong&gt;happens for the opposite reason – the flow has been maintained for too long. If a flow doesn’t expire, the admin won’t get any data on it, so this is necessary to maintain visibility. The default is typically 30 minutes, but one minute is more popular in practice.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Netflow Collector&lt;/strong&gt; is a server or appliance that receives the &lt;strong&gt;aggregated flows&lt;/strong&gt;, &lt;strong&gt;storing&lt;/strong&gt; and &lt;strong&gt;pre-processing&lt;/strong&gt; it for use by the &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;. The &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt; is software-based and provides the necessary insights.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/netflow-analyzer-graphs.png&quot; alt=&quot;netflow analyzer graphs&quot; id=&quot;netflow analyzer graphs&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;netflow analyzer graphs&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;Click to visit&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;It often takes pains to present information in a digestible form, with graphs, tables, alerts, and reporting tools.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-what-are-the-differences&quot;&gt;Netflow vs SNMP – What are the Differences?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you’ve heard of &lt;strong&gt;Netflow&lt;/strong&gt;, you likely know of &lt;strong&gt;SNMP&lt;/strong&gt;. However, a popular misconception is that they’re similar. We’ll have a detailed explanation of this soon, but the bottom line is that the two protocols are very distinct. They take different approaches to monitoring, and are applicable in different scenarios.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike &lt;strong&gt;Netflow&lt;/strong&gt;, &lt;strong&gt;SNMP&lt;/strong&gt; can return real-time data. This has obvious advantages, but it also comes with some downsides. Though it’s excellent at giving visibility of the &lt;strong&gt;network and bandwidth usage&lt;/strong&gt;, it’s not as verbose. &lt;strong&gt;SNMP doesn’t maintain important information&lt;/strong&gt; for network admins such as what a &lt;strong&gt;user&lt;/strong&gt; or &lt;strong&gt;application&lt;/strong&gt; is doing, the &lt;strong&gt;type of traffic&lt;/strong&gt;, or &lt;strong&gt;source/destination addresses&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Essentially, SNMP can reveal that there’s an issue, but it’s not ideal for figuring out the cause. Though versions are fast and low-overhead, it’s often used for a quick overview, whereas &lt;strong&gt;Netflow&lt;/strong&gt; can be utilized as well as, or separately, for more &lt;strong&gt;in-depth analysis&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-ipfix-what-are-the-differences&quot;&gt;Netflow vs IPFIX – What are the Differences?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When it comes to &lt;strong&gt;Netflow&lt;/strong&gt; and &lt;strong&gt;IPFIX&lt;/strong&gt;, the mix-up is even more prevalent. In this case, it’s entirely understandable. &lt;strong&gt;IPFIX&lt;/strong&gt; is sometimes referred to as &lt;strong&gt;Netflow v10&lt;/strong&gt;, was created by some of the same people, is derived directly from &lt;strong&gt;Netflow v9&lt;/strong&gt;, and is &lt;strong&gt;backward compatible&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even so, there are several reasons it should be considered a separate entity. &lt;strong&gt;IPFIX&lt;/strong&gt; offers more flexibility when expanding outside of the Cisco ecosystem. It can, for example, add information usually reserved for the &lt;strong&gt;Syslog&lt;/strong&gt;, or &lt;strong&gt;integrate SNMP&lt;/strong&gt; info directly in the packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s worth noting that &lt;strong&gt;Netflow v9&lt;/strong&gt; comes close to this functionality with its &lt;strong&gt;Flexible Netflow support&lt;/strong&gt;, but it does require further configuration. On top of this, &lt;strong&gt;IPFIX&lt;/strong&gt; holds one big change in that it supports a &lt;strong&gt;vendor ID&lt;/strong&gt;. Users can assign an &lt;strong&gt;ID&lt;/strong&gt; to any piece of data for gathering, which is a large boon.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So why not use &lt;strong&gt;IPFIX&lt;/strong&gt; from the start? Well, flexibility isn’t always better. It can mean more chance of incompatibility and confusion. IP If &lt;strong&gt;Netflow&lt;/strong&gt; suits the needs, it’s sometimes not worth complicating matters. Again, we’ll be covering this in a &lt;strong&gt;dedicated IPFix&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; article with more technical detail. The main idea to keep in mind is that though &lt;strong&gt;IPFix&lt;/strong&gt; is preferred in many scenarios, it’s not always the best suited to the job.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article provided a &lt;strong&gt;basic understanding&lt;/strong&gt; of the &lt;strong&gt;Netflow protocol&lt;/strong&gt; and &lt;strong&gt;how it works&lt;/strong&gt;, including the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;strong&gt;Netflow Analyzers&lt;/strong&gt;. We’ve covered its history, protocol transports, and common ports, as well as its &lt;strong&gt;RFC status&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You should also recognise the &lt;strong&gt;benefit Netflow holds&lt;/strong&gt; for network admins, letting them get a general overview of &lt;strong&gt;traffic patterns&lt;/strong&gt; while also aiding in the &lt;strong&gt;diagnosis of bottlenecks&lt;/strong&gt;, &lt;strong&gt;flagging DoS attacks&lt;/strong&gt;, &lt;strong&gt;enhancing network planning&lt;/strong&gt;, and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we’ve covered briefly some of the &lt;strong&gt;differences between&lt;/strong&gt; the &lt;strong&gt;protocol&lt;/strong&gt; and &lt;strong&gt;SNMP&lt;/strong&gt; or &lt;strong&gt;IPFIX&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-basics-components-tools/netflow-basics-netflow-components-rfc-history-intro.webp&quot; alt=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This article will cover the &lt;strong&gt;basics&lt;/strong&gt; of &lt;strong&gt;Netflow&lt;/strong&gt;, including its use cases, &lt;strong&gt;Netflow supported devices&lt;/strong&gt;, &lt;strong&gt;Netflow history&lt;/strong&gt;, and variants. We’ll also dive into the technical details of &lt;strong&gt;how the Netflow protocol works&lt;/strong&gt;, including the &lt;strong&gt;Netflow ports&lt;/strong&gt;, and the &lt;strong&gt;various Netflow versions&lt;/strong&gt;. This will lead onto coverage of the various &lt;strong&gt;Netflow components&lt;/strong&gt;, including the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;strong&gt;Netflow Analyzer&lt;/strong&gt;, with some brief coverage of its main competition.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#introduction-to-netflow-what-is-netflow-used-for&quot; title=&quot;Introduction to Netflow: What is Netflow used for?&quot;&gt;Introduction to Netflow: What is Netflow used for?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-history-rfc-netflow-vendor-variants&quot; target=&quot;_self&quot; title=&quot;Netflow History, RFC, Netflow Vendor Variants&quot;&gt;Netflow History, RFC, Netflow Vendor Variants&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-protocol-transport-and-ports-what-can-i-see-with-netflow&quot; title=&quot;Netflow Protocol Transport and Ports. What can I see with Netflow?&quot;&gt;Netflow Protocol Transport and Ports. What can I see with Netflow?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-components-netflow-exporter-netflow-collector-and-network-analyzer&quot; title=&quot;Netflow Components: Netflow Exporter, Netflow Collector and Netflow Analyzer&quot;&gt;Netflow Components: Netflow Exporter, Netflow Collector and Netflow Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-snmp-what-are-the-differences&quot; title=&quot;Netflow vs SNMP – What are the Differences?&quot;&gt;Netflow vs SNMP – What are the Differences?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-vs-ipfix-what-are-the-differences&quot; title=&quot;Netflow vs IPFix – What are the Differences?&quot;&gt;Netflow vs IPFix – What are the Differences?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;a href=&quot;https://www.firewall.cx/networking-topics/protocols/netflow/1234-netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;introduction-to-netflow-what-is-netflow-used-for&quot;&gt;Introduction to Netflow – What is Netflow Used for?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Visibility&lt;/strong&gt; plays a key role in the &lt;strong&gt;maintenance and security&lt;/strong&gt; of any network. With it, admins can &lt;strong&gt;identify issues&lt;/strong&gt;, &lt;strong&gt;discover non-compliant users&lt;/strong&gt;, refine their provisioning, and more. &lt;strong&gt;Netflow&lt;/strong&gt; is a protocol developed by &lt;strong&gt;CISCO&lt;/strong&gt; that fulfils this purpose, letting interested parties understand &lt;strong&gt;network patterns&lt;/strong&gt; and &lt;strong&gt;protocol distribution&lt;/strong&gt;, while supporting more granular data like &lt;strong&gt;IP service type&lt;/strong&gt; for diagnosis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Its relatively &lt;strong&gt;low overhead&lt;/strong&gt; and &lt;strong&gt;trusted history&lt;/strong&gt; means that &lt;strong&gt;Netflow&lt;/strong&gt; is still around in some forms a decade after its release. As well as &lt;strong&gt;user and application monitoring&lt;/strong&gt;, admins utilize &lt;strong&gt;Netflow&lt;/strong&gt; for &lt;strong&gt;network planning&lt;/strong&gt;, &lt;strong&gt;application reporting and profiling&lt;/strong&gt;, &lt;strong&gt;security analysis&lt;/strong&gt;, and &lt;strong&gt;usage-based reporting and billing&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/cisco-netflow-router-cache.png&quot; alt=&quot;cisco netflow router cache&quot; id=&quot;cisco netflow router cache&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;cisco netflow router cache&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Broadly, a &lt;strong&gt;flow&lt;/strong&gt; is a &lt;strong&gt;group of packets&lt;/strong&gt; part of the &lt;strong&gt;same conversation&lt;/strong&gt; between &lt;strong&gt;two endpoints&lt;/strong&gt; in a network. More technically, a &lt;strong&gt;single flow&lt;/strong&gt; is defined by its &lt;strong&gt;5-tuple&lt;/strong&gt;, a &lt;strong&gt;collection&lt;/strong&gt; of &lt;strong&gt;five data points&lt;/strong&gt; that include:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Source and destination IPs addresses&lt;/li&gt;
&lt;li&gt;Source and destination ports&lt;/li&gt;
&lt;li&gt;The protocol&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As you’d expect, the Cisco-developed protocol is supported by a number of CISCO networking devices. The company’s &lt;strong&gt;IOS-XR routers&lt;/strong&gt; use a software implementation running on line card CPU, while the IOS line runs software on route processor. Meanwhile, &lt;strong&gt;Catalyst&lt;/strong&gt; and &lt;strong&gt;Nexus switches&lt;/strong&gt; have a dedicated hardware &lt;strong&gt;TCAM&lt;/strong&gt; implementation, generally supporting more flows.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-history-rfc-netflow-vendor-variants&quot;&gt;Netflow History, RFC, Netflow Vendor Variants&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Of course, Cisco isn’t the sole vendor of devices with &lt;strong&gt;Netflow-like&lt;/strong&gt; support. &lt;strong&gt;Netflow&lt;/strong&gt; began its evolution in &lt;strong&gt;1996&lt;/strong&gt; with &lt;strong&gt;IOS 11.x&lt;/strong&gt; as a software technique, rather than a hardware one. Initially, it was designed for LAN and scaled poorly, resulting in the rise of the &lt;strong&gt;express forwarding&lt;/strong&gt; technique. Cisco, seemingly recognising the value of its solution, later &lt;strong&gt;enabled hardware-based implementations&lt;/strong&gt;, which allow for higher bandwidth.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, with the rise of &lt;strong&gt;Netflow&lt;/strong&gt; came a number of other popular vendors trying to cash in on it. In a bid to avoid trademark battles, various competitors implemented their own flavors of the technique. &lt;strong&gt;Juniper’s jflow&lt;/strong&gt; is one such example, as well as &lt;strong&gt;Huawei’s NetStream&lt;/strong&gt;, and&lt;strong&gt; HP’s SFlow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the various solutions complicating matters, the &lt;strong&gt;IETF&lt;/strong&gt; released &lt;strong&gt;IPFIX&lt;/strong&gt; as the &lt;strong&gt;official standard&lt;/strong&gt; in 2008. Making matters more confusing, &lt;strong&gt;IPFIX&lt;/strong&gt; is sometimes &lt;strong&gt;referred&lt;/strong&gt; to as &lt;strong&gt;Netflow v10&lt;/strong&gt;. In reality, the latest &lt;strong&gt;official version&lt;/strong&gt; of &lt;strong&gt;Netflow&lt;/strong&gt; is &lt;strong&gt;v9&lt;/strong&gt;, with IPFIX simply bearing some similarities. &lt;strong&gt;Netflow version 9&lt;/strong&gt; is described in &lt;a href=&quot;https://tools.ietf.org/html/rfc3954&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;RFC 3954&quot; title=&quot;RFC 3954&quot;&gt;RFC 3954&lt;/a&gt; on the informational track rather than standards. &lt;strong&gt;IPFIX&lt;/strong&gt; is on the standards track with &lt;a href=&quot;https://tools.ietf.org/html/rfc7012&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;RFC 7012&quot; title=&quot;RFC 7012&quot;&gt;RFC 7012&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt; is generally supported in &lt;strong&gt;three versions&lt;/strong&gt;. Cisco did not publicly release versions 2-4, and v1 is naturally obsolete. Routers and switches most commonly support &lt;strong&gt;Netflow v5&lt;/strong&gt;, &lt;strong&gt;v8&lt;/strong&gt;, and &lt;strong&gt;v9&lt;/strong&gt;, with v6 out of support and v7 seemingly exclusive to Catalyst 5K series switches.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow records&lt;/strong&gt; are &lt;strong&gt;exported&lt;/strong&gt; via &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html&quot; target=&quot;_blank&quot; id=&quot;UDP&quot; title=&quot;UDP&quot;&gt;&lt;strong&gt;UDP&lt;/strong&gt;&lt;/a&gt; and received by the &lt;strong&gt;Netflow Collector&lt;/strong&gt;, which we’ll dive into more later. Suffice it to say that the &lt;strong&gt;IP address of the collector&lt;/strong&gt; and the &lt;strong&gt;UDP destination port&lt;/strong&gt; must be configured on the sending router, with the most common &lt;strong&gt;port&lt;/strong&gt; being &lt;strong&gt;UDP 2055&lt;/strong&gt;. Some Netflow implementations protect against packet loss through use of &lt;strong&gt;SCTP&lt;/strong&gt;, however, this is not always performant if multiple independent collectors are in play.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-protocol-transport-and-ports-what-can-i-see-with-netflow&quot;&gt;Netflow Protocol Transport and Ports. What Can I See with Netflow?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, a &lt;strong&gt;Netflow enabled device&lt;/strong&gt; inspects a number of parameters to define differentiate flows. These provide some natural, basic visibility. The &lt;strong&gt;source&lt;/strong&gt; and &lt;strong&gt;destination addresses&lt;/strong&gt; can tell admins who is &lt;strong&gt;sending&lt;/strong&gt; and &lt;strong&gt;receiving traffic&lt;/strong&gt;, for example.&amp;nbsp; The &lt;strong&gt;ports&lt;/strong&gt; show which &lt;strong&gt;applications&lt;/strong&gt; are utilizing the traffic, &lt;strong&gt;class of service&lt;/strong&gt; indicates the priority, and the &lt;strong&gt;interface&lt;/strong&gt; how traffic is being utilized by the device.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, the collection of various data points can lead to information beyond this. Tailed packets and bytes reveal the amount of traffic, and can be combined with data like timestamps for bytes per second, TCP flags to examine handshakes, subnet mask for prefix calculation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The amount of real-world benefit often depends on the analysis tools at your disposal. With the right &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;, admins can use collected data to determine the following:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;General traffic patterns&lt;/li&gt;
&lt;li&gt;Diagnosis of slow performance, including network bottlenecks&lt;/li&gt;
&lt;li&gt;Unusual network behaviour&lt;/li&gt;
&lt;li&gt;The network impact of certain applications&lt;/li&gt;
&lt;li&gt;Unauthorized WAN traffic, unusual network behaviour such as DoS&lt;/li&gt;
&lt;li&gt;QoS validation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a name=&quot;netflow-components-netflow-exporter-netflow-collector-and-network-analyzer&quot;&gt;Netflow Components: Netflow Exporter, Netflow Collector and Network Analyzer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To fully understand &lt;strong&gt;Netflow&lt;/strong&gt;, it’s necessary to have an idea of its various components and how they function. It consists of &lt;strong&gt;three components&lt;/strong&gt;: the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;. Each of these has a different role, and is often based on different hardware.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/how-netflow-works.png&quot; alt=&quot;how netflow works&quot; id=&quot;how netflow works&quot; style=&quot;display: block; margin: 7px auto; border: 1px solid #000000;&quot; title=&quot;how netflow works&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These are fairly self-explanatory. The &lt;strong&gt;Netflow Exporter&lt;/strong&gt; is an &lt;strong&gt;appliance&lt;/strong&gt; or &lt;strong&gt;network device&lt;/strong&gt;, an example device is a &lt;strong&gt;router&lt;/strong&gt; or &lt;strong&gt;firewall&lt;/strong&gt;. It gathers packets into &lt;strong&gt;flows&lt;/strong&gt; and &lt;strong&gt;exports flow records&lt;/strong&gt; to &lt;strong&gt;collectors&lt;/strong&gt; when it decides the flow expires.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Netflow Exporter&lt;/strong&gt; determines which flows are new by the &lt;strong&gt;5-tuple data points&lt;/strong&gt; mentioned above. When packets enter the network, they’re checked against a table of recent flows called the flow cache. If the packet matches an existing &lt;strong&gt;5-tuple&lt;/strong&gt;, information such as packet count and byte length for the flow is updated. If not, a new entry is created.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router &lt;strong&gt;expires flows&lt;/strong&gt;, &lt;strong&gt;exports them&lt;/strong&gt;, and &lt;strong&gt;removes them&lt;/strong&gt; from the &lt;strong&gt;cache&lt;/strong&gt;. It takes indications from &lt;strong&gt;TCP flags&lt;/strong&gt;, such as &lt;strong&gt;FIN&lt;/strong&gt; or &lt;strong&gt;RST&lt;/strong&gt;, or when one of two requirements are met:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;In an inactive timeout&lt;/strong&gt;, flows expire when no packets have been detected in a set period. The default for this is usually fifteen seconds, but it can be adjusted to a network’s needs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;An active timeout &lt;/strong&gt;happens for the opposite reason – the flow has been maintained for too long. If a flow doesn’t expire, the admin won’t get any data on it, so this is necessary to maintain visibility. The default is typically 30 minutes, but one minute is more popular in practice.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Netflow Collector&lt;/strong&gt; is a server or appliance that receives the &lt;strong&gt;aggregated flows&lt;/strong&gt;, &lt;strong&gt;storing&lt;/strong&gt; and &lt;strong&gt;pre-processing&lt;/strong&gt; it for use by the &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt;. The &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; id=&quot;Netflow Analyzer&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;strong&gt;Netflow Analyzer&lt;/strong&gt;&lt;/a&gt; is software-based and provides the necessary insights.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-basics-components-tools/netflow-analyzer-graphs.png&quot; alt=&quot;netflow analyzer graphs&quot; id=&quot;netflow analyzer graphs&quot; style=&quot;margin: 7px auto; border: 1px solid #000000; display: block;&quot; title=&quot;netflow analyzer graphs&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer&quot;&gt;Click to visit&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;It often takes pains to present information in a digestible form, with graphs, tables, alerts, and reporting tools.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-snmp-what-are-the-differences&quot;&gt;Netflow vs SNMP – What are the Differences?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you’ve heard of &lt;strong&gt;Netflow&lt;/strong&gt;, you likely know of &lt;strong&gt;SNMP&lt;/strong&gt;. However, a popular misconception is that they’re similar. We’ll have a detailed explanation of this soon, but the bottom line is that the two protocols are very distinct. They take different approaches to monitoring, and are applicable in different scenarios.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Unlike &lt;strong&gt;Netflow&lt;/strong&gt;, &lt;strong&gt;SNMP&lt;/strong&gt; can return real-time data. This has obvious advantages, but it also comes with some downsides. Though it’s excellent at giving visibility of the &lt;strong&gt;network and bandwidth usage&lt;/strong&gt;, it’s not as verbose. &lt;strong&gt;SNMP doesn’t maintain important information&lt;/strong&gt; for network admins such as what a &lt;strong&gt;user&lt;/strong&gt; or &lt;strong&gt;application&lt;/strong&gt; is doing, the &lt;strong&gt;type of traffic&lt;/strong&gt;, or &lt;strong&gt;source/destination addresses&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Essentially, SNMP can reveal that there’s an issue, but it’s not ideal for figuring out the cause. Though versions are fast and low-overhead, it’s often used for a quick overview, whereas &lt;strong&gt;Netflow&lt;/strong&gt; can be utilized as well as, or separately, for more &lt;strong&gt;in-depth analysis&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;netflow-vs-ipfix-what-are-the-differences&quot;&gt;Netflow vs IPFIX – What are the Differences?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When it comes to &lt;strong&gt;Netflow&lt;/strong&gt; and &lt;strong&gt;IPFIX&lt;/strong&gt;, the mix-up is even more prevalent. In this case, it’s entirely understandable. &lt;strong&gt;IPFIX&lt;/strong&gt; is sometimes referred to as &lt;strong&gt;Netflow v10&lt;/strong&gt;, was created by some of the same people, is derived directly from &lt;strong&gt;Netflow v9&lt;/strong&gt;, and is &lt;strong&gt;backward compatible&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even so, there are several reasons it should be considered a separate entity. &lt;strong&gt;IPFIX&lt;/strong&gt; offers more flexibility when expanding outside of the Cisco ecosystem. It can, for example, add information usually reserved for the &lt;strong&gt;Syslog&lt;/strong&gt;, or &lt;strong&gt;integrate SNMP&lt;/strong&gt; info directly in the packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It’s worth noting that &lt;strong&gt;Netflow v9&lt;/strong&gt; comes close to this functionality with its &lt;strong&gt;Flexible Netflow support&lt;/strong&gt;, but it does require further configuration. On top of this, &lt;strong&gt;IPFIX&lt;/strong&gt; holds one big change in that it supports a &lt;strong&gt;vendor ID&lt;/strong&gt;. Users can assign an &lt;strong&gt;ID&lt;/strong&gt; to any piece of data for gathering, which is a large boon.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So why not use &lt;strong&gt;IPFIX&lt;/strong&gt; from the start? Well, flexibility isn’t always better. It can mean more chance of incompatibility and confusion. IP If &lt;strong&gt;Netflow&lt;/strong&gt; suits the needs, it’s sometimes not worth complicating matters. Again, we’ll be covering this in a &lt;strong&gt;dedicated IPFix&lt;/strong&gt; and &lt;strong&gt;Netflow&lt;/strong&gt; article with more technical detail. The main idea to keep in mind is that though &lt;strong&gt;IPFix&lt;/strong&gt; is preferred in many scenarios, it’s not always the best suited to the job.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article provided a &lt;strong&gt;basic understanding&lt;/strong&gt; of the &lt;strong&gt;Netflow protocol&lt;/strong&gt; and &lt;strong&gt;how it works&lt;/strong&gt;, including the &lt;strong&gt;Netflow Exporter&lt;/strong&gt;, &lt;strong&gt;Netflow Collector&lt;/strong&gt;, and &lt;strong&gt;Netflow Analyzers&lt;/strong&gt;. We’ve covered its history, protocol transports, and common ports, as well as its &lt;strong&gt;RFC status&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You should also recognise the &lt;strong&gt;benefit Netflow holds&lt;/strong&gt; for network admins, letting them get a general overview of &lt;strong&gt;traffic patterns&lt;/strong&gt; while also aiding in the &lt;strong&gt;diagnosis of bottlenecks&lt;/strong&gt;, &lt;strong&gt;flagging DoS attacks&lt;/strong&gt;, &lt;strong&gt;enhancing network planning&lt;/strong&gt;, and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we’ve covered briefly some of the &lt;strong&gt;differences between&lt;/strong&gt; the &lt;strong&gt;protocol&lt;/strong&gt; and &lt;strong&gt;SNMP&lt;/strong&gt; or &lt;strong&gt;IPFIX&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Netflow" />
	</entry>
	<entry>
		<title>NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp; Optimization Windows - Linux</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html"/>
		<published>2019-06-16T17:35:13+10:00</published>
		<updated>2019-06-16T17:35:13+10:00</updated>
		<id>https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyzer-intro.webp&quot; alt=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/netflow-analyzer-traffic.png&quot; alt=&quot;netflow analyzer traffic&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow analyzer traffic&quot; /&gt;In our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow application visibility&quot;&gt;previous article&lt;/a&gt; we explained how a &lt;strong&gt;Netflow Analyzer&lt;/strong&gt; can help you gain &lt;strong&gt;visibility&lt;/strong&gt; into your &lt;strong&gt;user traffic&lt;/strong&gt;, &lt;strong&gt;application traffic&lt;/strong&gt; and &lt;strong&gt;data flows&lt;/strong&gt; while at the same time &lt;strong&gt;analyze traffic patterns&lt;/strong&gt;, &lt;strong&gt;detect unusual traffic&lt;/strong&gt;, &lt;strong&gt;verify bandwidth availability&lt;/strong&gt;,&lt;strong&gt; detect Quality of Service&lt;/strong&gt;&amp;nbsp;(QoS) problems and a lot more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we will introduce &lt;strong&gt;Network Analyzer&lt;/strong&gt; - a bandwidth and traffic analysis tool that helps you &lt;strong&gt;monitor&lt;/strong&gt; the &lt;strong&gt;bandwidth utilization&lt;/strong&gt; in your network and &lt;strong&gt;analyze&lt;/strong&gt; the who, when, what of your network traffic. It uses &lt;strong&gt;flow technology&lt;/strong&gt; to give you &lt;strong&gt;real time visibility&lt;/strong&gt; into your network and supports all major flow formats such us &lt;strong&gt;netflow&lt;/strong&gt;, &lt;strong&gt;sflow&lt;/strong&gt;, &lt;strong&gt;jflow&lt;/strong&gt;, &lt;strong&gt;IPFIX&lt;/strong&gt;, and &lt;strong&gt;appflow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Network Analyzer&lt;/strong&gt; helps you to drill down into interface level details to &lt;strong&gt;discover traffic patterns&lt;/strong&gt; and &lt;strong&gt;monitor device performance&lt;/strong&gt;, &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;classify Non-Standard Apps&lt;/strong&gt; that hog your network bandwidth, and &lt;strong&gt;detect security threats&lt;/strong&gt;. Using a &lt;strong&gt;network bandwidth monitoring tool&lt;/strong&gt; like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to monitor all these critical parameters in &lt;strong&gt;real-time&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free NetFlow Analyzer Download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/1-netflow-analyzer-download-button.png&quot; alt=&quot;netflow analyzer download&quot; title=&quot;netflow analyzer download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#easy-installation-netflow-analyzer&quot; title=&quot;Easy Installation of Manageengine NetFlow Analyzer (Windows - Linux)&quot;&gt;Easy Installation of Manageengine NetFlow Analyzer (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#setting-up-netflow-analyzer&quot; title=&quot;Setting up NetFlow Analyzer (Windows - Linux)&quot;&gt;Setting up NetFlow Analyzer (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#starting-network-analyzer-as-a-service&quot; title=&quot;Configuring NetFlow Analyzer Startup as a Service (Windows - Linux)&quot;&gt;Configuring NetFlow Analyzer Startup as a Service (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#getting-started-with-network-analyzer&quot; title=&quot;Getting Started with NetFlow Analyzer&quot;&gt;Getting Started with NetFlow Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;NetFlow Analyzer Installation - Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;easy-installation-netflow-analyzer&quot;&gt;Easy Installation&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is available for Windows and Linux platforms. For information on supported versions and other specifications, look up &lt;a href=&quot;https://www.manageengine.com/products/netflow/help/system-requirements-netflow.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer System Requirements.&quot;&gt;System Requirements.&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Installing NetFlow Analyzer&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Download&lt;/strong&gt;&amp;nbsp; &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer for Windows&quot;&gt;NetFlow Analyzer for Windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Double-click&lt;/strong&gt; it to start installation. Follow the instructions as they appear on screen to install NetFlow Analyzer on to your machine successfully. NetFlow Analyzer supports both, &lt;strong&gt;PostgreSQL&lt;/strong&gt; and &lt;strong&gt;MSSQL&lt;/strong&gt; as database. Select the desired database and &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Download &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer for Linux&quot;&gt;NetFlow Analyzer for Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Assign &lt;strong&gt;execute&lt;/strong&gt; permission using the command: &lt;strong&gt;chmod a+x&lt;/strong&gt; &lt;strong&gt;ManageEngine_NetFlowAnalyzer_xxxx.bin&lt;/strong&gt; where &lt;strong&gt;ManageEngine_NetFlowAnalyzer_xxxx&lt;/strong&gt; is the name of the downloaded BIN file.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Note: During installation if you get an error message stating that the temp folder does not have enough space, try executing this command with the &lt;strong&gt;-is:tempdiroption&lt;/strong&gt; parameter where is the absolute path of an existing directory:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin -is:tempdir&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For non-x11 machines, use the following command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin -console&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Follow the instructions as they appear on the screen to install NetFlow Analyzer on to your machine successfully.&lt;/p&gt;
&lt;p&gt;Once you have successfully installed &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, start the NetFlow Analyzer server by following the steps below.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;setting-up-netflow-analyzer&quot;&gt;Setting up NetFlow Analyzer&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Click&lt;/strong&gt; on&amp;nbsp;&lt;strong&gt;Start &amp;gt; Services &amp;gt; start the ManageEngine&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;OpManager&lt;/strong&gt; to start the service.&lt;/p&gt;
&lt;p&gt;Alternatively you can navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;bin&lt;/em&gt;&lt;/strong&gt; folder in a CMD prompt and invoke the&amp;nbsp;&lt;strong&gt;run.bat&lt;/strong&gt; file to start as application.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;br /&gt; Navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;/bin&lt;/em&gt;&lt;/strong&gt; directory and execute the&amp;nbsp;&lt;strong&gt;./run.sh&lt;/strong&gt; file.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the server is started, a command prompt window opens up showing startup information on several modules of &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;. Once all the modules have been successfully created, and the server has started, connect your client at &lt;strong&gt;http://localhost:8060&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The default port is &lt;strong&gt;8060&lt;/strong&gt; and it will be replaced by the port you have specified as the&amp;nbsp;&lt;a href=&quot;https://www.manageengine.com/products/netflow/help/system-requirements-netflow.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow web server port&quot;&gt;web server port&lt;/a&gt; during installation.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;starting-network-analyzer-as-a-service&quot;&gt;Starting as Service&lt;/a&gt;&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;br /&gt; If you have chosen the&amp;nbsp;&lt;strong&gt;Start as Service&lt;/strong&gt; option during installation, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; will run as a &lt;strong&gt;service&lt;/strong&gt; on Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Login as root user.&lt;/li&gt;
&lt;li&gt;Navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;bin&lt;/em&gt;&lt;/strong&gt; directory.&lt;/li&gt;
&lt;li&gt;Execute the &lt;strong&gt;linkAsService.sh&lt;/strong&gt; file&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Then execute the command&amp;nbsp;&lt;strong&gt;systemctl start OpManager.service&amp;nbsp;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This starts NetFlow Analyzer as a service on Linux.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;getting-started-with-network-analyzer&quot;&gt;Getting Started with NetFlow Analyzer&lt;/a&gt;&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once you download and install NetFlow Analyzer, the next big step is to get started with the basic initial settings. As soon as you &lt;strong&gt;launch NetFlow Analyzer&lt;/strong&gt;, the &lt;strong&gt;Getting started &lt;/strong&gt;window pops up, giving you an overview of the steps to follow.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-welcome-screen-large.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Installation Welcome Screen&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Installation Welcome Screen&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-welcome-screen.png&quot; alt=&quot;manageengine netflow analyer welcome screen&quot; title=&quot;manageengine netflow analyer welcome screen&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With its built-in templates, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to &lt;strong&gt;export flows&lt;/strong&gt; and &lt;strong&gt;discover your devices&lt;/strong&gt; at ease. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; saves you the time and hassle of manually configuring flows and devices by allowing you to &lt;a href=&quot;https://www.manageengine.com/products/netflow/help/direct-flow-export.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;export flows&quot;&gt;export flows directly from the UI in four simple steps&lt;/a&gt; and automating the device discovery with its pre-defined configlets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-configuration-large.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Configuration Screen&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Configuration Screen&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-configuration.png&quot; alt=&quot;manageengine netflow analyer configuration&quot; title=&quot;manageengine netflow analyer configuration&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With a &lt;strong&gt;complete bandwidth analysis tool&lt;/strong&gt; like, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, you will be able to plan and &lt;strong&gt;optimize your bandwidth usage&lt;/strong&gt; better, &lt;strong&gt;avoid bottlenecks&lt;/strong&gt;, and &lt;strong&gt;connectivity issues, detect unusual traffic patterns and security threats,&lt;/strong&gt; thereby drastically improving your &lt;strong&gt;network performance&lt;/strong&gt; and &lt;strong&gt;user experience&lt;/strong&gt; and &lt;strong&gt;security posture&lt;/strong&gt;. &lt;a href=&quot;https://www.manageengine.com/products/netflow/demo-form.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer Personalized Demo&quot;&gt;Get a free personalized demo&lt;/a&gt; or check out the product for &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free NetFlow Analyzer Download&quot;&gt;free for 30 days&lt;/a&gt;!&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyzer-intro.webp&quot; alt=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/netflow-analyzer-traffic.png&quot; alt=&quot;netflow analyzer traffic&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow analyzer traffic&quot; /&gt;In our &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow application visibility&quot;&gt;previous article&lt;/a&gt; we explained how a &lt;strong&gt;Netflow Analyzer&lt;/strong&gt; can help you gain &lt;strong&gt;visibility&lt;/strong&gt; into your &lt;strong&gt;user traffic&lt;/strong&gt;, &lt;strong&gt;application traffic&lt;/strong&gt; and &lt;strong&gt;data flows&lt;/strong&gt; while at the same time &lt;strong&gt;analyze traffic patterns&lt;/strong&gt;, &lt;strong&gt;detect unusual traffic&lt;/strong&gt;, &lt;strong&gt;verify bandwidth availability&lt;/strong&gt;,&lt;strong&gt; detect Quality of Service&lt;/strong&gt;&amp;nbsp;(QoS) problems and a lot more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we will introduce &lt;strong&gt;Network Analyzer&lt;/strong&gt; - a bandwidth and traffic analysis tool that helps you &lt;strong&gt;monitor&lt;/strong&gt; the &lt;strong&gt;bandwidth utilization&lt;/strong&gt; in your network and &lt;strong&gt;analyze&lt;/strong&gt; the who, when, what of your network traffic. It uses &lt;strong&gt;flow technology&lt;/strong&gt; to give you &lt;strong&gt;real time visibility&lt;/strong&gt; into your network and supports all major flow formats such us &lt;strong&gt;netflow&lt;/strong&gt;, &lt;strong&gt;sflow&lt;/strong&gt;, &lt;strong&gt;jflow&lt;/strong&gt;, &lt;strong&gt;IPFIX&lt;/strong&gt;, and &lt;strong&gt;appflow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Network Analyzer&lt;/strong&gt; helps you to drill down into interface level details to &lt;strong&gt;discover traffic patterns&lt;/strong&gt; and &lt;strong&gt;monitor device performance&lt;/strong&gt;, &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;classify Non-Standard Apps&lt;/strong&gt; that hog your network bandwidth, and &lt;strong&gt;detect security threats&lt;/strong&gt;. Using a &lt;strong&gt;network bandwidth monitoring tool&lt;/strong&gt; like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to monitor all these critical parameters in &lt;strong&gt;real-time&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free NetFlow Analyzer Download&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/1-netflow-analyzer-download-button.png&quot; alt=&quot;netflow analyzer download&quot; title=&quot;netflow analyzer download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#easy-installation-netflow-analyzer&quot; title=&quot;Easy Installation of Manageengine NetFlow Analyzer (Windows - Linux)&quot;&gt;Easy Installation of Manageengine NetFlow Analyzer (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#setting-up-netflow-analyzer&quot; title=&quot;Setting up NetFlow Analyzer (Windows - Linux)&quot;&gt;Setting up NetFlow Analyzer (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#starting-network-analyzer-as-a-service&quot; title=&quot;Configuring NetFlow Analyzer Startup as a Service (Windows - Linux)&quot;&gt;Configuring NetFlow Analyzer Startup as a Service (Windows - Linux)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#getting-started-with-network-analyzer&quot; title=&quot;Getting Started with NetFlow Analyzer&quot;&gt;Getting Started with NetFlow Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot; title=&quot;NetFlow Analyzer Installation - Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Related Articles:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html&quot; target=&quot;_blank&quot; title=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&quot;&gt;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;easy-installation-netflow-analyzer&quot;&gt;Easy Installation&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is available for Windows and Linux platforms. For information on supported versions and other specifications, look up &lt;a href=&quot;https://www.manageengine.com/products/netflow/help/system-requirements-netflow.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer System Requirements.&quot;&gt;System Requirements.&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Installing NetFlow Analyzer&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Download&lt;/strong&gt;&amp;nbsp; &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer for Windows&quot;&gt;NetFlow Analyzer for Windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Double-click&lt;/strong&gt; it to start installation. Follow the instructions as they appear on screen to install NetFlow Analyzer on to your machine successfully. NetFlow Analyzer supports both, &lt;strong&gt;PostgreSQL&lt;/strong&gt; and &lt;strong&gt;MSSQL&lt;/strong&gt; as database. Select the desired database and &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Download &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow Analyzer for Linux&quot;&gt;NetFlow Analyzer for Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Assign &lt;strong&gt;execute&lt;/strong&gt; permission using the command: &lt;strong&gt;chmod a+x&lt;/strong&gt; &lt;strong&gt;ManageEngine_NetFlowAnalyzer_xxxx.bin&lt;/strong&gt; where &lt;strong&gt;ManageEngine_NetFlowAnalyzer_xxxx&lt;/strong&gt; is the name of the downloaded BIN file.&lt;/li&gt;
&lt;li&gt;Execute the following command: &lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Note: During installation if you get an error message stating that the temp folder does not have enough space, try executing this command with the &lt;strong&gt;-is:tempdiroption&lt;/strong&gt; parameter where is the absolute path of an existing directory:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin -is:tempdir&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For non-x11 machines, use the following command:&lt;/p&gt;
&lt;p class=&quot;box-content&quot;&gt;&lt;strong&gt;./ManageEngine_NetFlowAnalyzer_xxxx.bin -console&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Follow the instructions as they appear on the screen to install NetFlow Analyzer on to your machine successfully.&lt;/p&gt;
&lt;p&gt;Once you have successfully installed &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, start the NetFlow Analyzer server by following the steps below.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;setting-up-netflow-analyzer&quot;&gt;Setting up NetFlow Analyzer&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Click&lt;/strong&gt; on&amp;nbsp;&lt;strong&gt;Start &amp;gt; Services &amp;gt; start the ManageEngine&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;OpManager&lt;/strong&gt; to start the service.&lt;/p&gt;
&lt;p&gt;Alternatively you can navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;bin&lt;/em&gt;&lt;/strong&gt; folder in a CMD prompt and invoke the&amp;nbsp;&lt;strong&gt;run.bat&lt;/strong&gt; file to start as application.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;br /&gt; Navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;/bin&lt;/em&gt;&lt;/strong&gt; directory and execute the&amp;nbsp;&lt;strong&gt;./run.sh&lt;/strong&gt; file.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the server is started, a command prompt window opens up showing startup information on several modules of &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;. Once all the modules have been successfully created, and the server has started, connect your client at &lt;strong&gt;http://localhost:8060&lt;/strong&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The default port is &lt;strong&gt;8060&lt;/strong&gt; and it will be replaced by the port you have specified as the&amp;nbsp;&lt;a href=&quot;https://www.manageengine.com/products/netflow/help/system-requirements-netflow.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;NetFlow web server port&quot;&gt;web server port&lt;/a&gt; during installation.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;starting-network-analyzer-as-a-service&quot;&gt;Starting as Service&lt;/a&gt;&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Windows:&lt;/strong&gt;&lt;br /&gt; If you have chosen the&amp;nbsp;&lt;strong&gt;Start as Service&lt;/strong&gt; option during installation, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; will run as a &lt;strong&gt;service&lt;/strong&gt; on Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Linux:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Login as root user.&lt;/li&gt;
&lt;li&gt;Navigate to the&amp;nbsp;&lt;strong&gt;&lt;em&gt;bin&lt;/em&gt;&lt;/strong&gt; directory.&lt;/li&gt;
&lt;li&gt;Execute the &lt;strong&gt;linkAsService.sh&lt;/strong&gt; file&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Then execute the command&amp;nbsp;&lt;strong&gt;systemctl start OpManager.service&amp;nbsp;&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This starts NetFlow Analyzer as a service on Linux.&lt;/p&gt;
&lt;h3&gt;&lt;a name=&quot;getting-started-with-network-analyzer&quot;&gt;Getting Started with NetFlow Analyzer&lt;/a&gt;&lt;/h3&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once you download and install NetFlow Analyzer, the next big step is to get started with the basic initial settings. As soon as you &lt;strong&gt;launch NetFlow Analyzer&lt;/strong&gt;, the &lt;strong&gt;Getting started &lt;/strong&gt;window pops up, giving you an overview of the steps to follow.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-welcome-screen-large.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Installation Welcome Screen&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Installation Welcome Screen&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-welcome-screen.png&quot; alt=&quot;manageengine netflow analyer welcome screen&quot; title=&quot;manageengine netflow analyer welcome screen&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With its built-in templates, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to &lt;strong&gt;export flows&lt;/strong&gt; and &lt;strong&gt;discover your devices&lt;/strong&gt; at ease. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; saves you the time and hassle of manually configuring flows and devices by allowing you to &lt;a href=&quot;https://www.manageengine.com/products/netflow/help/direct-flow-export.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;export flows&quot;&gt;export flows directly from the UI in four simple steps&lt;/a&gt; and automating the device discovery with its pre-defined configlets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-configuration-large.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Configuration Screen&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Configuration Screen&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-analyzer-installation/manageengine-netflow-analyer-configuration.png&quot; alt=&quot;manageengine netflow analyer configuration&quot; title=&quot;manageengine netflow analyer configuration&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With a &lt;strong&gt;complete bandwidth analysis tool&lt;/strong&gt; like, &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, you will be able to plan and &lt;strong&gt;optimize your bandwidth usage&lt;/strong&gt; better, &lt;strong&gt;avoid bottlenecks&lt;/strong&gt;, and &lt;strong&gt;connectivity issues, detect unusual traffic patterns and security threats,&lt;/strong&gt; thereby drastically improving your &lt;strong&gt;network performance&lt;/strong&gt; and &lt;strong&gt;user experience&lt;/strong&gt; and &lt;strong&gt;security posture&lt;/strong&gt;. &lt;a href=&quot;https://www.manageengine.com/products/netflow/demo-form.html?utm_source=firewallcx&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Netflow Analyzer Personalized Demo&quot;&gt;Get a free personalized demo&lt;/a&gt; or check out the product for &lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free NetFlow Analyzer Download&quot;&gt;free for 30 days&lt;/a&gt;!&lt;/p&gt;</content>
		<category term="Netflow" />
	</entry>
	<entry>
		<title>Netflow: Monitor Bandwidth &amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns, Problems and more</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html"/>
		<published>2019-05-05T02:45:51+10:00</published>
		<updated>2019-05-05T02:45:51+10:00</updated>
		<id>https://www.firewall.cx/networking/network-protocols/netflow/netflow-monitor-network-bandwidth-application-traffic.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-introduction/netflow-monitor-network-bandwidth-application-traffic-intro.webp&quot; alt=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-intro.jpg&quot; alt=&quot;netflow analyzer intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow analyzer intro&quot; /&gt;Monitoring network traffic&lt;/strong&gt; &amp;amp; &lt;strong&gt;bandwidth usage&lt;/strong&gt; via &lt;strong&gt;Netflow&lt;/strong&gt; is mandatory for any type and size network. Gaining &lt;strong&gt;visibility&lt;/strong&gt; into &lt;strong&gt;user traffic&lt;/strong&gt;, &lt;strong&gt;application traffic&lt;/strong&gt; and &lt;strong&gt;data flows&lt;/strong&gt; allows network engineers, administrators and security specialists &lt;strong&gt;detect bottlenecks&lt;/strong&gt; – &lt;strong&gt;network congestion&lt;/strong&gt;, &lt;strong&gt;unusual traffic patterns&lt;/strong&gt;, &lt;strong&gt;monitor SLA agreements&lt;/strong&gt; with providers, &lt;strong&gt;verify bandwidth availability&lt;/strong&gt;, &lt;strong&gt;detect Quality of Service&lt;/strong&gt; (QoS) issues, &lt;strong&gt;Wi-Fi Network monitoring&lt;/strong&gt;, plus much more.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-discover-monitor-traffic&quot; title=&quot;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&quot;&gt;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-visibility&quot; title=&quot;Important Features in a Netflow Tool: Visibility&quot;&gt;Important Features in a Netflow Monitoring Tool: Visibility&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-troubleshooting&quot; title=&quot;Important Features in a Netflow Tool: Troubleshooting&quot;&gt;Important Features in a Netflow Monitoring Tool: Troubleshooting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-capacity-planning&quot; title=&quot;Important Features in a Netflow Tool: Network Capacity Planning&quot;&gt;Important Features in a Netflow Monitoring Tool: Network Capacity Planning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-network-security-analysis&quot; title=&quot;Important Features in a Netflow Tool: Security Analysis&quot;&gt;Important Features in a Netflow Monitoring Tool: Security Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-media-traffic&quot; title=&quot;Important Features in a Netflow Tool: Monitoring Media Rich Traffic&quot;&gt;Important Features in a Netflow Monitoring Tool: Monitor Media Rich Traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-analyzer&quot; title=&quot;NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&quot;&gt;NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-summary&quot; title=&quot;Netflow Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Related articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-discover-monitor-traffic&quot;&gt;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt; is a &lt;strong&gt;network protocol&lt;/strong&gt; developed by Cisco used to &lt;strong&gt;collect IP traffic information&lt;/strong&gt; and &lt;strong&gt;monitoring network traffic&lt;/strong&gt;. It’s used and supported in almost any network and has become the de-factor industry standard.&lt;/p&gt;
&lt;p&gt;Other vendors support similar flow technologies, here are a few examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;HP/3Com, Dell and Netgear: &lt;strong&gt;s-flow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Juniper: &lt;strong&gt;Jflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Ericsson: &lt;strong&gt;Rflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Alcatel-Lucent: &lt;strong&gt;Cflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Huawei: &lt;strong&gt;NetStream&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IT infrastructure has become much more sophisticated in the last decade and equally complicated. With the market growing every day, customer expectations are higher than ever. Networks are &lt;strong&gt;no more limited within a firewall&lt;/strong&gt;. Now it extends to &lt;strong&gt;public&lt;/strong&gt; and &lt;strong&gt;private clouds&lt;/strong&gt;, and &lt;strong&gt;SaaS&lt;/strong&gt;. This makes it more important for network admins to ensure &lt;strong&gt;faster connectivity&lt;/strong&gt; between the user, and the &lt;strong&gt;public&lt;/strong&gt; and &lt;strong&gt;private clouds&lt;/strong&gt; or data centres.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The primary objective of &lt;strong&gt;bandwidth analysis&lt;/strong&gt; is to &lt;strong&gt;monitor the performance of your network&lt;/strong&gt;, and this can include different types of &lt;strong&gt;bandwidth utilization&lt;/strong&gt; such as &lt;strong&gt;application traffic&lt;/strong&gt;, &lt;strong&gt;wireless network&lt;/strong&gt;, &lt;strong&gt;Wide Area Network&lt;/strong&gt; (WAN) or &lt;strong&gt;Local Area Network&lt;/strong&gt; (LAN) utilization, etc., where every device, service, and individual user is competing for their share of bandwidth. While the immediate solution for &lt;strong&gt;traffic congestion&lt;/strong&gt; could be increasing your &lt;strong&gt;bandwidth capacity&lt;/strong&gt;, the challenge is in realizing if your enterprise even requires that extra bandwidth. And in case you find yourself unable to provide sufficient bandwidth to users based on their needs or unable to control non-business traffic, you are not alone.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network admins cannot manually keep track of everything going on in your network 24x7, and according to reports and surveys conducted by Packeteers, at least &lt;strong&gt;sixty to seventy percent&lt;/strong&gt; of network managers &lt;strong&gt;don’t know what is traversing their networks&lt;/strong&gt;. Your network is prone to various &lt;strong&gt;attacks&lt;/strong&gt;, and &lt;strong&gt;congestions&lt;/strong&gt; or &lt;strong&gt;spikes&lt;/strong&gt; in your network could be caused by &lt;strong&gt;internal&lt;/strong&gt; or &lt;strong&gt;external threats&lt;/strong&gt; that can vary from &lt;strong&gt;DDoS attacks&lt;/strong&gt; to your own &lt;strong&gt;business-critical applications&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As we can appreciate, it is extremely important the network tools used are capable of providing enough information and visibility so we can monitor, identify and troubleshoot effectively and efficiently as possible.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common question is what capabilities should the &lt;strong&gt;bandwidth monitoring tool&lt;/strong&gt; provide?&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-visibility&quot;&gt;Important Features in a Netflow Monitoring Tool: Visibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first step to &lt;strong&gt;identifying and preventing network issues&lt;/strong&gt; before it affects your network is &lt;strong&gt;real-time monitoring&lt;/strong&gt;. An &lt;strong&gt;effective bandwidth monitoring tool&lt;/strong&gt; must help you understand &lt;strong&gt;which applications&lt;/strong&gt; in your network &lt;strong&gt;are consuming the most bandwidth&lt;/strong&gt;, the &lt;strong&gt;top talkers&lt;/strong&gt; in the network, and &lt;strong&gt;how much traffic&lt;/strong&gt; is being used at &lt;strong&gt;any particular time&lt;/strong&gt;. This helps you identify the problem users and keep in under control.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-troubleshooting&quot;&gt;Important Features in a Netflow Monitoring Tool: Troubleshooting&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;bandwidth monitoring tool&lt;/strong&gt; should not only help you monitor bandwidth, but should also help you &lt;strong&gt;identify performance issues&lt;/strong&gt; like &lt;strong&gt;traffic spike&lt;/strong&gt; and &lt;strong&gt;bandwidth hogs&lt;/strong&gt;. It must be able to &lt;strong&gt;alert&lt;/strong&gt; you in &lt;strong&gt;real-time&lt;/strong&gt;, helping you troubleshoot the issues before it affects your end users.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-capacity-planning&quot;&gt;Important Features in a Netflow Monitoring Tool: Network Capacity Planning&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An ideal bandwidth monitor should also be able to help prevent unwarranted spending on broadband fees. It must help you &lt;strong&gt;track bandwidth usage patterns&lt;/strong&gt; and &lt;strong&gt;plan your bandwidth requirements&lt;/strong&gt; and help to pick the perfect data plan or ISP you require, as your network grows.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-network-security-analysis&quot;&gt;Important Features in a Netflow Monitoring Tool: Security Analysis&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the most important aspects that you should consider, especially in recent times, is &lt;strong&gt;network security&lt;/strong&gt;. And it is vital when your business depends on &lt;strong&gt;wireless network&lt;/strong&gt; and &lt;strong&gt;cloud services&lt;/strong&gt; for all its major activities. A stable and &lt;strong&gt;efficient network security system&lt;/strong&gt; is essential to protecting client data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a large number of security concerns your network can face any time like &lt;strong&gt;worm attacks&lt;/strong&gt;, &lt;strong&gt;zero-day attacks&lt;/strong&gt; and &lt;strong&gt;Distributed Denial of Service&lt;/strong&gt; (&lt;strong&gt;DDOS) attacks&lt;/strong&gt;. Considering recent attacks like the &lt;a href=&quot;https://github.blog/2018-03-01-ddos-incident-report/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;DDOS attack on GITHUB&quot;&gt;DDOS attack on GITHUB&lt;/a&gt;, which was traced to over a thousand different ASNs where the traffic spiked up to &lt;strong&gt;1.35 Tbps&lt;/strong&gt;, it's always better to be prepared for scenarios.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/ddos-attack-on-github.png&quot; alt=&quot;ddos attack on github&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;ddos attack on github&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Github&amp;nbsp;inbound traffic reached 1.35Tbps during the attack&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-media-traffic&quot;&gt;Important Features in a Netflow Monitoring Tool: Monitor Media Rich Traffic&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The volume of video traffic in networks is growing everyday with increasing dependence on video conference, video calls, and virtual boardrooms, it is important to keep a check on how much of your bandwidth is used for this, to ensure the quality of the media and also to make sure other applications are not affected by this.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-analyzer&quot;&gt;ManageEngine NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is a bandwidth and traffic analysis tool that helps you &lt;strong&gt;monitor the bandwidth utilization&lt;/strong&gt; in your network and analyze the who, when, what of your network traffic. It uses &lt;strong&gt;flow technology&lt;/strong&gt; to give you &lt;strong&gt;real time visibility&lt;/strong&gt; into your network and &lt;strong&gt;supports all major flow formats&lt;/strong&gt; such us &lt;strong&gt;netflow&lt;/strong&gt;, &lt;strong&gt;sflow&lt;/strong&gt;, &lt;strong&gt;jflow&lt;/strong&gt;, &lt;strong&gt;IPFIX&lt;/strong&gt;, and &lt;strong&gt;appflow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It helps you to drill down into interface level details to &lt;strong&gt;discover traffic patterns&lt;/strong&gt; and &lt;strong&gt;monitor device performance&lt;/strong&gt;, &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;classify Non-Standard Apps&lt;/strong&gt; that &lt;strong&gt;hog your network bandwidth&lt;/strong&gt;, and &lt;strong&gt;detect security threats&lt;/strong&gt;. Using a &lt;strong&gt;network bandwidth monitoring&lt;/strong&gt; tool like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to monitor all these critical parameters in &lt;strong&gt;real-time&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Download - Netflow Analyzer&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-download-button.png&quot; alt=&quot;netflow analyzer download&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Real-time Visibility&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer's Inventory&lt;/strong&gt; acts as a directory for traffic overview, providing &lt;strong&gt;detailed traffic reports&lt;/strong&gt; by &lt;strong&gt;device&lt;/strong&gt;, &lt;strong&gt;interface&lt;/strong&gt;, &lt;strong&gt;applications&lt;/strong&gt;, and &lt;strong&gt;QoS&lt;/strong&gt;. You can also drill down to see the &lt;strong&gt;top sources&lt;/strong&gt;, &lt;strong&gt;destinations&lt;/strong&gt;, and &lt;strong&gt;conversations&lt;/strong&gt;, highlighting the &lt;strong&gt;top talkers&lt;/strong&gt; in your network, for detailed analysis. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; has a very simplified, &lt;strong&gt;easy-to-use and customizable GUI&lt;/strong&gt;. You can custom filter, sort, and customize the view of your bandwidth graphs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-real-time-visibility.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Real-time Visibility&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Real-time Visibility&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-real-time-visibility-small.png&quot; alt=&quot;netflow analyzer real time visibility&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer real time visibility&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Customized &amp;amp; Advanced Alerting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Create&lt;/strong&gt; and &lt;strong&gt;manage alerts profiles&lt;/strong&gt;, set &lt;strong&gt;custom threshold-based&lt;/strong&gt; and &lt;strong&gt;link-down alerts&lt;/strong&gt;, and get notified in &lt;strong&gt;real-time&lt;/strong&gt; in case any violations. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; gives you options to get alerted via SMS, Email, SNMP trap, or even log SDP tickets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-alert-generation.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Advanced Customizable Alerting&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Advanced Customizable Alerting&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-alert-generation-small.png&quot; alt=&quot;netflow analyzer alert generation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer alert generation&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; helps you &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;identifies usage patterns&lt;/strong&gt; and &lt;strong&gt;application growth&lt;/strong&gt; by measuring your &lt;strong&gt;bandwidth growth&lt;/strong&gt; over a &lt;strong&gt;period time&lt;/strong&gt; with &lt;strong&gt;long term reporting&lt;/strong&gt;. &lt;strong&gt;Capacity planning&lt;/strong&gt; reports helps you foresee your future needs, helps you make informed decisions on your bandwidth growth. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; also helps you &lt;strong&gt;identify bandwidth hogs&lt;/strong&gt; and reconfigure your policies with its traffic shaping options to &lt;strong&gt;optimize your bandwidth usage&lt;/strong&gt; by ensuring priority of your business critical app. You can also leverage &lt;a href=&quot;https://www.manageengine.com/products/netflow/usage-based-billing.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;on-demand billing&quot;&gt;on-demand billing&lt;/a&gt; and schedule bill plans for individual customers or departments based on bandwidth utilization, or even use it to verify your ISPs billing.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-capacity-planning.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-capacity-planning-small.png&quot; alt=&quot;netflow analyzer capacity planning&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer capacity planning&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Security&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;NetFlow Analyzer's &lt;strong&gt;advanced security analytic module&lt;/strong&gt; identifies junk traffic using its &lt;strong&gt;advanced mining algorithm&lt;/strong&gt; and categorizes them based on the issues. It helps you detect a broad spectrum of &lt;strong&gt;external&lt;/strong&gt; and &lt;strong&gt;internal security threats&lt;/strong&gt; using &lt;strong&gt;Continuous Stream Mining Engine technology&lt;/strong&gt;, track &lt;strong&gt;network anomalies&lt;/strong&gt; that surpass your network firewall, and identify &lt;strong&gt;context-sensitive anomalies&lt;/strong&gt; and &lt;strong&gt;zero-day intrusions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-security-attacks.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Security&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Security&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-security-attacks-small.png&quot; alt=&quot;netflow analyzer security attacks&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer security attacks&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Reporting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Customize&lt;/strong&gt; and &lt;strong&gt;generate reports&lt;/strong&gt; with &lt;strong&gt;NetFlow Analyzer’s&lt;/strong&gt; various reporting features available. NetFlow Analyzer allows you to generate &lt;strong&gt;Search&lt;/strong&gt;, &lt;strong&gt;Compare&lt;/strong&gt;, &lt;strong&gt;Consolidated&lt;/strong&gt;, and &lt;strong&gt;Forensics reports&lt;/strong&gt; among many others, schedule them, create report profiles, and export them as email, PDFs, or CSVs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-reporting.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Reporting&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Reporting&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-reporting-small.png&quot; alt=&quot;netflow analyzer reporting&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer reporting&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Distributed Monitoring&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Enterprise Edition&lt;/strong&gt; of &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is built for &lt;strong&gt;large distributed networks&lt;/strong&gt;. A typical distributed networks' setup involves a &lt;strong&gt;single Central Server&lt;/strong&gt; and &quot;&lt;strong&gt;n&lt;/strong&gt;&quot; number of &lt;strong&gt;Distributed collectors&lt;/strong&gt; based on number of remote locations where the collectors collect &amp;amp; process the flows from the routers and passes the compressed data to the Central Server through a secure connection, and the Central server stores the data from the collectors and provides a centralized web console for generation of reports. It is scalable up to &lt;strong&gt;80,000 flows/sec&lt;/strong&gt; and lets you &lt;strong&gt;monitor all remote locations&lt;/strong&gt; from a &lt;strong&gt;single centralized console&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-large-scale-deployment.png&quot; alt=&quot;netflow analyzer large scale deployment&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer large scale deployment&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we explained how &lt;strong&gt;Netflow&lt;/strong&gt;, the industry standard in &lt;strong&gt;network and bandwidth monitoring&lt;/strong&gt; can provide clear and precise view of your &lt;strong&gt;network status&lt;/strong&gt;, &lt;strong&gt;link bandwidth utilization&lt;/strong&gt;, but also extend to give an insight on &lt;strong&gt;application traffic&lt;/strong&gt;, &lt;strong&gt;user traffic patterns&lt;/strong&gt; and more &lt;strong&gt;valuable metrics&lt;/strong&gt; and data. We also showed how a complete bandwidth analysis tool like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, can help you &lt;strong&gt;plan and optimize your bandwidth&lt;/strong&gt; usage better, &lt;strong&gt;avoid bottleneck&lt;/strong&gt;, and &lt;strong&gt;connectivity issues&lt;/strong&gt; thereby drastically &lt;strong&gt;improving your network performance&lt;/strong&gt; and user experience.&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Netflow Analyzer&quot;&gt;Get a free personalized demo&lt;/a&gt; of NetFlow Analyzer or check out the product for&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Netflow Analyzer&quot;&gt;free for 30 days&lt;/a&gt;!&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/networking/netflow/netflow-introduction/netflow-monitor-network-bandwidth-application-traffic-intro.webp&quot; alt=&quot;Netflow: Monitor Bandwidth &amp;amp; Network Utilization. Detect LAN, WAN, Wi-Fi Bottlenecks, Unusual Traffic Patterns&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-intro.jpg&quot; alt=&quot;netflow analyzer intro&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;netflow analyzer intro&quot; /&gt;Monitoring network traffic&lt;/strong&gt; &amp;amp; &lt;strong&gt;bandwidth usage&lt;/strong&gt; via &lt;strong&gt;Netflow&lt;/strong&gt; is mandatory for any type and size network. Gaining &lt;strong&gt;visibility&lt;/strong&gt; into &lt;strong&gt;user traffic&lt;/strong&gt;, &lt;strong&gt;application traffic&lt;/strong&gt; and &lt;strong&gt;data flows&lt;/strong&gt; allows network engineers, administrators and security specialists &lt;strong&gt;detect bottlenecks&lt;/strong&gt; – &lt;strong&gt;network congestion&lt;/strong&gt;, &lt;strong&gt;unusual traffic patterns&lt;/strong&gt;, &lt;strong&gt;monitor SLA agreements&lt;/strong&gt; with providers, &lt;strong&gt;verify bandwidth availability&lt;/strong&gt;, &lt;strong&gt;detect Quality of Service&lt;/strong&gt; (QoS) issues, &lt;strong&gt;Wi-Fi Network monitoring&lt;/strong&gt;, plus much more.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Topics&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-discover-monitor-traffic&quot; title=&quot;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&quot;&gt;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-visibility&quot; title=&quot;Important Features in a Netflow Tool: Visibility&quot;&gt;Important Features in a Netflow Monitoring Tool: Visibility&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-troubleshooting&quot; title=&quot;Important Features in a Netflow Tool: Troubleshooting&quot;&gt;Important Features in a Netflow Monitoring Tool: Troubleshooting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-capacity-planning&quot; title=&quot;Important Features in a Netflow Tool: Network Capacity Planning&quot;&gt;Important Features in a Netflow Monitoring Tool: Network Capacity Planning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-network-security-analysis&quot; title=&quot;Important Features in a Netflow Tool: Security Analysis&quot;&gt;Important Features in a Netflow Monitoring Tool: Security Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#important-features-netflow-media-traffic&quot; title=&quot;Important Features in a Netflow Tool: Monitoring Media Rich Traffic&quot;&gt;Important Features in a Netflow Monitoring Tool: Monitor Media Rich Traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-analyzer&quot; title=&quot;NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&quot;&gt;NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#netflow-summary&quot; title=&quot;Netflow Summary&quot;&gt;Summary&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Related articles:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-vs-snmp-network-monitoring.html&quot; target=&quot;_blank&quot; title=&quot;Netflow vs SNMP. Two Different Approaches to Network Monitoring&quot;&gt;Netflow vs SNMP. Two Different Approaches to Network Monitoring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/netflow-basics-netflow-components-rfc-history.html&quot; target=&quot;_blank&quot; title=&quot;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&quot;&gt;Complete Guide to Netflow: How Netflow &amp;amp; its Components Work. Netflow Monitoring Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/netflow/manageengine-netflow-analyzer.html&quot; target=&quot;_blank&quot; title=&quot;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&quot;&gt;NetFlow Analyzer: Free Download, Step-by-Step Installation, Configuration &amp;amp; Optimization Windows - Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-discover-monitor-traffic&quot;&gt;Netflow: Discovering &amp;amp; Monitoring Your Network Traffic&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Netflow&lt;/strong&gt; is a &lt;strong&gt;network protocol&lt;/strong&gt; developed by Cisco used to &lt;strong&gt;collect IP traffic information&lt;/strong&gt; and &lt;strong&gt;monitoring network traffic&lt;/strong&gt;. It’s used and supported in almost any network and has become the de-factor industry standard.&lt;/p&gt;
&lt;p&gt;Other vendors support similar flow technologies, here are a few examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;HP/3Com, Dell and Netgear: &lt;strong&gt;s-flow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Juniper: &lt;strong&gt;Jflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Ericsson: &lt;strong&gt;Rflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Alcatel-Lucent: &lt;strong&gt;Cflow&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Huawei: &lt;strong&gt;NetStream&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IT infrastructure has become much more sophisticated in the last decade and equally complicated. With the market growing every day, customer expectations are higher than ever. Networks are &lt;strong&gt;no more limited within a firewall&lt;/strong&gt;. Now it extends to &lt;strong&gt;public&lt;/strong&gt; and &lt;strong&gt;private clouds&lt;/strong&gt;, and &lt;strong&gt;SaaS&lt;/strong&gt;. This makes it more important for network admins to ensure &lt;strong&gt;faster connectivity&lt;/strong&gt; between the user, and the &lt;strong&gt;public&lt;/strong&gt; and &lt;strong&gt;private clouds&lt;/strong&gt; or data centres.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The primary objective of &lt;strong&gt;bandwidth analysis&lt;/strong&gt; is to &lt;strong&gt;monitor the performance of your network&lt;/strong&gt;, and this can include different types of &lt;strong&gt;bandwidth utilization&lt;/strong&gt; such as &lt;strong&gt;application traffic&lt;/strong&gt;, &lt;strong&gt;wireless network&lt;/strong&gt;, &lt;strong&gt;Wide Area Network&lt;/strong&gt; (WAN) or &lt;strong&gt;Local Area Network&lt;/strong&gt; (LAN) utilization, etc., where every device, service, and individual user is competing for their share of bandwidth. While the immediate solution for &lt;strong&gt;traffic congestion&lt;/strong&gt; could be increasing your &lt;strong&gt;bandwidth capacity&lt;/strong&gt;, the challenge is in realizing if your enterprise even requires that extra bandwidth. And in case you find yourself unable to provide sufficient bandwidth to users based on their needs or unable to control non-business traffic, you are not alone.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Network admins cannot manually keep track of everything going on in your network 24x7, and according to reports and surveys conducted by Packeteers, at least &lt;strong&gt;sixty to seventy percent&lt;/strong&gt; of network managers &lt;strong&gt;don’t know what is traversing their networks&lt;/strong&gt;. Your network is prone to various &lt;strong&gt;attacks&lt;/strong&gt;, and &lt;strong&gt;congestions&lt;/strong&gt; or &lt;strong&gt;spikes&lt;/strong&gt; in your network could be caused by &lt;strong&gt;internal&lt;/strong&gt; or &lt;strong&gt;external threats&lt;/strong&gt; that can vary from &lt;strong&gt;DDoS attacks&lt;/strong&gt; to your own &lt;strong&gt;business-critical applications&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As we can appreciate, it is extremely important the network tools used are capable of providing enough information and visibility so we can monitor, identify and troubleshoot effectively and efficiently as possible.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A common question is what capabilities should the &lt;strong&gt;bandwidth monitoring tool&lt;/strong&gt; provide?&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-visibility&quot;&gt;Important Features in a Netflow Monitoring Tool: Visibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The first step to &lt;strong&gt;identifying and preventing network issues&lt;/strong&gt; before it affects your network is &lt;strong&gt;real-time monitoring&lt;/strong&gt;. An &lt;strong&gt;effective bandwidth monitoring tool&lt;/strong&gt; must help you understand &lt;strong&gt;which applications&lt;/strong&gt; in your network &lt;strong&gt;are consuming the most bandwidth&lt;/strong&gt;, the &lt;strong&gt;top talkers&lt;/strong&gt; in the network, and &lt;strong&gt;how much traffic&lt;/strong&gt; is being used at &lt;strong&gt;any particular time&lt;/strong&gt;. This helps you identify the problem users and keep in under control.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-troubleshooting&quot;&gt;Important Features in a Netflow Monitoring Tool: Troubleshooting&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;bandwidth monitoring tool&lt;/strong&gt; should not only help you monitor bandwidth, but should also help you &lt;strong&gt;identify performance issues&lt;/strong&gt; like &lt;strong&gt;traffic spike&lt;/strong&gt; and &lt;strong&gt;bandwidth hogs&lt;/strong&gt;. It must be able to &lt;strong&gt;alert&lt;/strong&gt; you in &lt;strong&gt;real-time&lt;/strong&gt;, helping you troubleshoot the issues before it affects your end users.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-capacity-planning&quot;&gt;Important Features in a Netflow Monitoring Tool: Network Capacity Planning&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An ideal bandwidth monitor should also be able to help prevent unwarranted spending on broadband fees. It must help you &lt;strong&gt;track bandwidth usage patterns&lt;/strong&gt; and &lt;strong&gt;plan your bandwidth requirements&lt;/strong&gt; and help to pick the perfect data plan or ISP you require, as your network grows.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-network-security-analysis&quot;&gt;Important Features in a Netflow Monitoring Tool: Security Analysis&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the most important aspects that you should consider, especially in recent times, is &lt;strong&gt;network security&lt;/strong&gt;. And it is vital when your business depends on &lt;strong&gt;wireless network&lt;/strong&gt; and &lt;strong&gt;cloud services&lt;/strong&gt; for all its major activities. A stable and &lt;strong&gt;efficient network security system&lt;/strong&gt; is essential to protecting client data.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are a large number of security concerns your network can face any time like &lt;strong&gt;worm attacks&lt;/strong&gt;, &lt;strong&gt;zero-day attacks&lt;/strong&gt; and &lt;strong&gt;Distributed Denial of Service&lt;/strong&gt; (&lt;strong&gt;DDOS) attacks&lt;/strong&gt;. Considering recent attacks like the &lt;a href=&quot;https://github.blog/2018-03-01-ddos-incident-report/&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;DDOS attack on GITHUB&quot;&gt;DDOS attack on GITHUB&lt;/a&gt;, which was traced to over a thousand different ASNs where the traffic spiked up to &lt;strong&gt;1.35 Tbps&lt;/strong&gt;, it's always better to be prepared for scenarios.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/ddos-attack-on-github.png&quot; alt=&quot;ddos attack on github&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;ddos attack on github&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Github&amp;nbsp;inbound traffic reached 1.35Tbps during the attack&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;important-features-netflow-media-traffic&quot;&gt;Important Features in a Netflow Monitoring Tool: Monitor Media Rich Traffic&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The volume of video traffic in networks is growing everyday with increasing dependence on video conference, video calls, and virtual boardrooms, it is important to keep a check on how much of your bandwidth is used for this, to ensure the quality of the media and also to make sure other applications are not affected by this.&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-analyzer&quot;&gt;ManageEngine NetFlow Analyzer: An Efficient, Precise, Reliable Professional Netflow Tool&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is a bandwidth and traffic analysis tool that helps you &lt;strong&gt;monitor the bandwidth utilization&lt;/strong&gt; in your network and analyze the who, when, what of your network traffic. It uses &lt;strong&gt;flow technology&lt;/strong&gt; to give you &lt;strong&gt;real time visibility&lt;/strong&gt; into your network and &lt;strong&gt;supports all major flow formats&lt;/strong&gt; such us &lt;strong&gt;netflow&lt;/strong&gt;, &lt;strong&gt;sflow&lt;/strong&gt;, &lt;strong&gt;jflow&lt;/strong&gt;, &lt;strong&gt;IPFIX&lt;/strong&gt;, and &lt;strong&gt;appflow&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It helps you to drill down into interface level details to &lt;strong&gt;discover traffic patterns&lt;/strong&gt; and &lt;strong&gt;monitor device performance&lt;/strong&gt;, &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;classify Non-Standard Apps&lt;/strong&gt; that &lt;strong&gt;hog your network bandwidth&lt;/strong&gt;, and &lt;strong&gt;detect security threats&lt;/strong&gt;. Using a &lt;strong&gt;network bandwidth monitoring&lt;/strong&gt; tool like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; allows you to monitor all these critical parameters in &lt;strong&gt;real-time&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Download - Netflow Analyzer&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-download-button.png&quot; alt=&quot;netflow analyzer download&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer download&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Real-time Visibility&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer's Inventory&lt;/strong&gt; acts as a directory for traffic overview, providing &lt;strong&gt;detailed traffic reports&lt;/strong&gt; by &lt;strong&gt;device&lt;/strong&gt;, &lt;strong&gt;interface&lt;/strong&gt;, &lt;strong&gt;applications&lt;/strong&gt;, and &lt;strong&gt;QoS&lt;/strong&gt;. You can also drill down to see the &lt;strong&gt;top sources&lt;/strong&gt;, &lt;strong&gt;destinations&lt;/strong&gt;, and &lt;strong&gt;conversations&lt;/strong&gt;, highlighting the &lt;strong&gt;top talkers&lt;/strong&gt; in your network, for detailed analysis. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; has a very simplified, &lt;strong&gt;easy-to-use and customizable GUI&lt;/strong&gt;. You can custom filter, sort, and customize the view of your bandwidth graphs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-real-time-visibility.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Real-time Visibility&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Real-time Visibility&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-real-time-visibility-small.png&quot; alt=&quot;netflow analyzer real time visibility&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer real time visibility&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Customized &amp;amp; Advanced Alerting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Create&lt;/strong&gt; and &lt;strong&gt;manage alerts profiles&lt;/strong&gt;, set &lt;strong&gt;custom threshold-based&lt;/strong&gt; and &lt;strong&gt;link-down alerts&lt;/strong&gt;, and get notified in &lt;strong&gt;real-time&lt;/strong&gt; in case any violations. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; gives you options to get alerted via SMS, Email, SNMP trap, or even log SDP tickets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-alert-generation.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Advanced Customizable Alerting&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Advanced Customizable Alerting&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-alert-generation-small.png&quot; alt=&quot;netflow analyzer alert generation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer alert generation&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; helps you &lt;strong&gt;recognize&lt;/strong&gt; and &lt;strong&gt;identifies usage patterns&lt;/strong&gt; and &lt;strong&gt;application growth&lt;/strong&gt; by measuring your &lt;strong&gt;bandwidth growth&lt;/strong&gt; over a &lt;strong&gt;period time&lt;/strong&gt; with &lt;strong&gt;long term reporting&lt;/strong&gt;. &lt;strong&gt;Capacity planning&lt;/strong&gt; reports helps you foresee your future needs, helps you make informed decisions on your bandwidth growth. &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; also helps you &lt;strong&gt;identify bandwidth hogs&lt;/strong&gt; and reconfigure your policies with its traffic shaping options to &lt;strong&gt;optimize your bandwidth usage&lt;/strong&gt; by ensuring priority of your business critical app. You can also leverage &lt;a href=&quot;https://www.manageengine.com/products/netflow/usage-based-billing.html&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;on-demand billing&quot;&gt;on-demand billing&lt;/a&gt; and schedule bill plans for individual customers or departments based on bandwidth utilization, or even use it to verify your ISPs billing.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-capacity-planning.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Capacity Planning &amp;amp; Traffic Shaping&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-capacity-planning-small.png&quot; alt=&quot;netflow analyzer capacity planning&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer capacity planning&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Security&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;NetFlow Analyzer's &lt;strong&gt;advanced security analytic module&lt;/strong&gt; identifies junk traffic using its &lt;strong&gt;advanced mining algorithm&lt;/strong&gt; and categorizes them based on the issues. It helps you detect a broad spectrum of &lt;strong&gt;external&lt;/strong&gt; and &lt;strong&gt;internal security threats&lt;/strong&gt; using &lt;strong&gt;Continuous Stream Mining Engine technology&lt;/strong&gt;, track &lt;strong&gt;network anomalies&lt;/strong&gt; that surpass your network firewall, and identify &lt;strong&gt;context-sensitive anomalies&lt;/strong&gt; and &lt;strong&gt;zero-day intrusions&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-security-attacks.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Security&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Security&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-security-attacks-small.png&quot; alt=&quot;netflow analyzer security attacks&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer security attacks&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Reporting&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Customize&lt;/strong&gt; and &lt;strong&gt;generate reports&lt;/strong&gt; with &lt;strong&gt;NetFlow Analyzer’s&lt;/strong&gt; various reporting features available. NetFlow Analyzer allows you to generate &lt;strong&gt;Search&lt;/strong&gt;, &lt;strong&gt;Compare&lt;/strong&gt;, &lt;strong&gt;Consolidated&lt;/strong&gt;, and &lt;strong&gt;Forensics reports&lt;/strong&gt; among many others, schedule them, create report profiles, and export them as email, PDFs, or CSVs.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-reporting.png&quot; class=&quot;jcepopup&quot; title=&quot;ManageEngine NetFlow Analyzer: Reporting&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;ManageEngine NetFlow Analyzer: Reporting&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-reporting-small.png&quot; alt=&quot;netflow analyzer reporting&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer reporting&quot; /&gt;&lt;/a&gt;Click to enlarge&lt;/p&gt;
&lt;h2&gt;ManageEngine NetFlow Analyzer: Distributed Monitoring&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Enterprise Edition&lt;/strong&gt; of &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt; is built for &lt;strong&gt;large distributed networks&lt;/strong&gt;. A typical distributed networks' setup involves a &lt;strong&gt;single Central Server&lt;/strong&gt; and &quot;&lt;strong&gt;n&lt;/strong&gt;&quot; number of &lt;strong&gt;Distributed collectors&lt;/strong&gt; based on number of remote locations where the collectors collect &amp;amp; process the flows from the routers and passes the compressed data to the Central Server through a secure connection, and the Central server stores the data from the collectors and provides a centralized web console for generation of reports. It is scalable up to &lt;strong&gt;80,000 flows/sec&lt;/strong&gt; and lets you &lt;strong&gt;monitor all remote locations&lt;/strong&gt; from a &lt;strong&gt;single centralized console&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/networking/netflow/netflow-introduction/netflow-analyzer-large-scale-deployment.png&quot; alt=&quot;netflow analyzer large scale deployment&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;netflow analyzer large scale deployment&quot; /&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name=&quot;netflow-summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we explained how &lt;strong&gt;Netflow&lt;/strong&gt;, the industry standard in &lt;strong&gt;network and bandwidth monitoring&lt;/strong&gt; can provide clear and precise view of your &lt;strong&gt;network status&lt;/strong&gt;, &lt;strong&gt;link bandwidth utilization&lt;/strong&gt;, but also extend to give an insight on &lt;strong&gt;application traffic&lt;/strong&gt;, &lt;strong&gt;user traffic patterns&lt;/strong&gt; and more &lt;strong&gt;valuable metrics&lt;/strong&gt; and data. We also showed how a complete bandwidth analysis tool like &lt;strong&gt;NetFlow Analyzer&lt;/strong&gt;, can help you &lt;strong&gt;plan and optimize your bandwidth&lt;/strong&gt; usage better, &lt;strong&gt;avoid bottleneck&lt;/strong&gt;, and &lt;strong&gt;connectivity issues&lt;/strong&gt; thereby drastically &lt;strong&gt;improving your network performance&lt;/strong&gt; and user experience.&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Netflow Analyzer&quot;&gt;Get a free personalized demo&lt;/a&gt; of NetFlow Analyzer or check out the product for&amp;nbsp;&lt;a href=&quot;https://clixtrac.com/goto/?278585&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;Free Netflow Analyzer&quot;&gt;free for 30 days&lt;/a&gt;!&lt;/p&gt;</content>
		<category term="Netflow" />
	</entry>
</feed>
