Exporter Configuration

This page provides commonly requested flow and metadata configuration details, as requested by our customers.

NetFlow Configurations

AdTran NetVanta Router

The Adtran NetVanta Router supports NetFlow v9. For more information, please refer to the Adtran Web Site.

Only enable egress flows (i.e. no ingress) on Adtran routers. More information can be found on page 27 of the Adtran Configuration Guide.

APCON Appliance

How to configure an APCON appliance

Aruba Appliance

How to configure an Aruba appliance

Big Switch

How to configure a Big Switch

Blue Coat MACH5

How to configure a Blue Coat MACH5

Check Point Appliance

Check Point GAiA NetFlow Configuration

Check Point Firewall

NetFlow from a Check Point Firewall

Cisco 4605 series with a daughter card configured with VLANs

Bandwidth needs to be set explicitly at the VLAN:

ip route-cache flow infer-fields
ip flow ingress infer-fields

Cisco 7600 router

If you plan to export NetFlow statistics, globally enable NDE on the router by issuing the following commands:

configure terminal
ip flow-export destination
ip flow-export version
mls nde sender version

Enable NetFlow on individual interfaces by issuing the following commands:

configure terminal
interface
ip flow ingress
  1. (Optional) To configure NetFlow sampling, do the following:

    1. Enable sampled NetFlow globally on the router (mls sampling).

    2. Enable sampled NetFlow on individual interfaces (mls netflow sampling).

  2. Verify the NDE configuration to ensure that it does not conflict with other features such as QoS or multicast. Use the show ip interface command to verify the configuration.

These and other related commands can be found in the Cisco 7600 Series Cisco IOS Software Configuration Guide.

Cisco ACI

Cisco ACI NetFlow Support

Cisco APIC

Cisco APIC NetFlow Support

Cisco ASA FireSIGHT

Cisco ASA FireSIGHT Integration

Cisco ASA Firewall

How to enable NetFlow on your Cisco ASA gear

Cisco ASA Firewall (using ASDM)

Cisco ASA NetFlow Configuration Using ASDM

Cisco ASR 1000

Cisco High Speed Logging

Cisco ASR 9000

How to configure NetFlow on the Cisco ASR

Cisco Catalyst 2960-X

How to configure a Cisco 2960-X

Cisco Catalyst 3750 with a 3KX module

Cisco 3750-X NetFlow Support

Cisco Catalyst 3850

Cisco Flexible NetFlow Configuration Guide

Cisco Catalyst 4500

Catalyst 4500 Series Switch NetFlow Configuration Examples

Cisco Catalyst 4510 Switch IOS XE 3.6

Configuring a Cisco Catalyst 4510 Switch IOS XE 3.6

Cisco Catalyst 4948E switch

Exporting NetFlow-Lite from the Cisco 4948E switch

Cisco Catalyst (4000 Series running in Hybrid or Native Mode)

Configure the switch the same as an IOS device, but instead of the command

ip route-cache flow

Use the following command:

ip route-cache flow infer-fields

This series requires a Supervisor Engine IV with a NetFlow Services daughter card to support NDE.

Cisco Catalyst Switch (non-4000 Series)

Are you running CatOS? Yes

Router side:

Enter the following global commands.

ip flow-export source
ip flow-export version 5
ip flow-export destination
ip flow-cache timeout active

Enter the following command on each physical interface. You will need to log into each interface one at a time.

ip route-cache flow

Switch side:

set mls nde
set mls nde version 5
set mls flow full
set mls agingtime long 128
set mls agingtime 64
set mls bridged-flow-statistics enable
set mls nde enable

No

Enter the following global commands (all commands are entered in the router config -t option).

ip flow-export source
ip flow-export version 5
ip flow-export destination
ip flow-cache timeout active 1
mls nde sender version 5
mls flow ip interface-full
mls nde interface
mls aging long 64
mls aging normal 64

Enter the following command on each physical interface. You will need to log into each interface one at a time.

ip route-cache flow

Cisco Catalyst 6500/6000 Series Switch

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Configuring NetFlow on the MSFC guide.

Cisco Catalyst 6509 Switch

Cisco Catalyst 6509 NetFlow Support

Cisco Catalyst 9300 Switch

Cisco Catalyst 9300 NetFlow Support

Cisco IWAN

Cisco IWAN Training

Cisco Nexus Series 1000

How to configure a Cisco Nexus 1000V to export NetFlow v9

Cisco Nexus Series 7000

Cisco documentation on how to enable NetFlow on Nexus 7000. The following Plixer blogs also provide information on this process:

Cisco Router (Cisco IOS)

Enable Cisco Express Forwarding:

router(config)# ip cef

In the configuration terminal on the router, issue the following to start NetFlow Export.

It is necessary to enable NetFlow on all interfaces through which traffic you are interested in will flow. Now, verify that the router is generating flow stats—try ‘show ip cache flow’. Note that for routers with distributed switching (GSR’s, 75XX’s) the Rendezvous Point CLI will only show flows that made it up to the RP. To see flows on the individual linecards use the ‘attach’ or ‘if-con’ command and issue the ‘show ip cache flow’ on each LC.

Enable export of these flows with the global commands. ‘ip flow-export source’ can be set to any interface, but the one which is the least likely to enter a ‘down’ state is preferable. NetFlow will not be exported if the specified source is down. For this reason, we suggest the Loopback interface, or a stable Ethernet interface:

router(config)# ip flow-export version 5
router(config)# ip flow-export destination
router(config)# ip flow-export source FastEthernet0

Use the IP address of your NetFlow Collector and configured listening port.

If your router uses BGP protocol, you can configure AS to be included in exports with command:

router(config)# ip flow-export version 5 [peer-as | origin-as]

The following commands break up flows into shorter segments.

router(config)# ip flow-cache timeout active 1
router(config)# ip flow-cache timeout inactive 15

Use the commands below to enable NetFlow on each physical interface (i.e. not VLANs and Tunnels, as they are auto included) you are interested in collecting a flow from. This will normally be an Ethernet or WAN interface. You may also need to set the speed of the interface in kilobits per second. It is especially important to set the speed for frame relay or ATM virtual circuits.

interface
ip route-cache flow
bandwidth

Now write your configuration with the ‘write’ or ‘copy run start’ commands. When in enabled mode, you can see current NetFlow configuration and state with the following commands:

router# show ip flow export
router# show ip cache flow
router# show ip cache verbose flow

Cisco Wireless LAN Controller

Cisco WLC NetFlow Configuration

Cisco Zone-Based Firewall

Cisco Zone-Based Firewall Logging Support

ESX Server running VMware

Enabling NetFlow on Virtual Switches

Exinda Router

how to configure an Exinda Router

Extreme (Enterasys) N-series DFE/S-series (native NetFlow in ASIC)

DFE and S series netflow commands

set netflow export-interval 1
set netflow export-destination 2055

Enable NetFlow on each type of interface on the switch. For example:

set netflow port fe.*.* enable
set netflow port ge.*.* enable
set netflow port tg.*.* enable
set netflow port lag.*.* enable
set netflow cache enable
set netflow export-version 9
set netflow template refresh-rate 50 timeout 1

NOTE: There is no performance impact to the switch because the flow creation and accounting is a native function of the ASIC. For more information, please refer to our “How to Enable NetFlow on an Enterasys SSR” guide.

Extreme Networks Router

To enable the flow statistics feature on a switch, use the following command:

enable flowstats

The flow statistics feature is disabled by default.

To disable the flow statistics feature on a switch, use the following command:

disable flowstats

To enable the flow statistics function on the specified port, use the following command:

enable flowstats ports

The flow statistics function is disabled by default.

To disable the flow statistics function on the specified port, use the following command:

disable flowstats ports

A single port can distribute statistics across multiple groups of flow-collector devices. This NetFlow distribution capability makes it possible to create a collection architecture that scales to accommodate high volumes of exported data. It also offers a health-checking function that improves the reliability of the collection architecture by ensuring that only responsive flow-collector devices are included in active export distribution lists. The distribution algorithm also ensures that all the ingress flow records for a given flow are exported to the same collector.

NetFlow distribution is enabled by configuring export distribution groups that identify the addresses of multiple flow-collector devices. You can configure up to 32 export distribution groups on a BlackDiamond 6800 series switch, and each group can contain as many as eight flow-collector devices.

To configure the export groups and flow-collector devices to which NetFlow datagrams are exported, use the following command:

config flowstats export <group#> [add | delete] [ | ] port

The group# parameter is an integer in the range from 1 through 32 that identifies the specific group for which the destination is being configured.

You can use the add and delete keywords to add or delete flow-collector destinations.

To export NetFlow datagrams to a group, you must configure at least one flow-collector destination. By default, no flow-collector destinations are configured. To configure a flow-collector destination, use either an IP address and UDP port number pair or a hostname and UDP port number pair to identify the flow-collector device to which NetFlow export datagrams are to be transmitted. You can configure up to eight flow-collector destinations for each group. When multiple flow-collectors are configured as members of the same group, the exported NetFlow datagrams are distributed across the available destinations.

To configure the IP address that is to be used as the source IP address for NetFlow datagrams to be exported, use the following command:

config flowstats source

By default, flow records are exported with the VLAN interface address that has a route to the configured flow-collector device. Depending on how it is configured, a flow-collector device can use the source IP address of received NetFlow datagrams to identify the switch that sent the information.

The following command example specifies that the IP address 192.168.100.1 is to be used as the source IP address for exported NetFlow datagrams.

config flowstats source 192.168.100.1

Flow records are exported on an age basis. If the age of the flow record is greater than the configured time-out, the record is exported.

To configure the time-out value for flow records on the specified port, use the following command:

config flowstats timeout ports [ | any]

The time-out value is the number of minutes to use in deciding when to export flow records. The default time-out is 5 minutes.

The following command example specifies a 10-minute time-out for exported NetFlow datagrams on port 1 of the Ethernet module installed in slot 8 of the BlackDiamond switch.

config flowstats timeout 10 ports 8:1

To reset the flow statistics configuration parameters for a specified Ethernet port to their default values, use the following command:

unconfig flowstats ports

To display status information for the flow statistics function, use the following command:

show flowstats {detail | group <group#> | ports }

where:

  1. detail Use this optional keyword to display detailed NetFlow configuration information.

  2. group# Use this optional parameter with the group keyword to display status information for a specific export group.

  3. portlist Use this optional parameter to specify one or more ports or slots and ports for which status information is to be displayed.

If you enter the show flowstats command with none of the optional keywords or parameters, the command displays a summary of status information for all ports.

The summary status display for a port shows the values for all flow statistics configuration parameters for the port.

The summary status display for an export group includes the following information:

  • Values for all configuration parameters

  • Status of each export destination device

The detailed status display for an export group includes the summary information, plus the following management information:

  • Counts of the number of times each flow collector destination has been taken out of service due to health-check (ping check) failures

  • The source IP address configuration information

For more information, please refer to Extreme Networks documentation and support at http://www.extremenetworks.com

Extreme S-Series, N-Series, and K-Series

Extreme NetFlow configuration for S-Series, N-Series, and K-Series

Fatpipe Wrap

Fatpipe Warp NetFlow Support

Fortiswitch-500

Fortiswitch IPFIX configuration

HP 9300

HP 9300 NetFlow configuration

Ixia Appliance

Ixia IPFIX configuration

Juniper Router

EX-series Switches.

Juniper supports flow exports by sampling packet headers with the routing engine and aggregating them into flows. Packet sampling is achieved by defining a firewall filter to accept and sample all traffic, applying that rule to an interface, and then configuring the sampling forwarding option.

interfaces {
ge - 0 / 1 / 0 {
  unit 0 {
    family inet {
      filter {
        input all;
        output all;
      }
      address / (
      }
    }
  }
}
firewall {
  filter all {
    term all {
      then {
        sample;
        accept;
      }
    }
  }
}
forwarding - options {
  sampling {
    input {
      family inet {
        rate 100;
      }
    }
    output {
      cflowd {
        port;
        version;
      }
    }
  }
}

For more information on configuring Juniper routers, refer to: http://www.juniper.net.

Meraki

Meraki NetFlow Support

MikroTik Router

Below are examples of how to enable Traffic-Flow on a router.

Enable Traffic-Flow on the router:

[admin@MikroTik] ip traffic-flow> set enabled=yes
[admin@MikroTik] ip traffic-flow> print
enabled: yes
interfaces: all
cache-entries: 1k
active-flow-timeout: 1m
inactive-flow-timeout: 15s
[admin@MikroTik] ip traffic-flow>

Specify IP address and port of the host, which will receive Traffic-Flow packets:

[admin@MikroTik] ip traffic-flow target>
add address=192.168.0.2:2055 \
\… version=9
[admin@MikroTik] ip traffic-flow target> print
Flags: X  disabled
# ADDRESS VERSION
0 192.168.0.2:2055 9
[admin@MikroTik] ip traffic-flow target>

For further information see our blog MikroTik NetFlow Support.

Palo Alto Firewall

How to configure a Palo Alto Device

pfSense Firewall

Exporting NetFlow data with softflowd

Riverbed Steelhead Appliance

(config)# ip flow-export destination interface
(config)# ip flow-export enable

View more Steelhead commands.

Silver Peak WAN Optimizer

How to configure a Silver Peak WAN Optimizer

Softflowd Netflow Probe

How to configure softflowd

Sophos Cyberoam

How to configure a Sophos Cyberoam

Talari Appliance

Talari NetFlow Support

Velocloud Appliance

Velocloud IPFIX Support

Viavi Observer GigaStor

Viavi Observer GigaStor NetFlow Support

vSphere 5 Server and want to use vMotion on multiple network adapters

Watch the video here, it explains the NetFlow piece starting at ~10.20.

Learn how to enable NetFlow on vSphere

vSwitch

How to configure a vSwitch

Vyatta Core 6 software

Configuration

system {
accounting {
  interface {#
    multi - value sampling - rate# sample 1 in N packets,
      default
  }
  syslog - facility facility netflow {
    version < 1 | 5 | 9 > #
      default 5 engine - id# 0 - 255 server {#
        multi - value port#
      }
    timeout {
      expiry - interval#
      default 60 flow - generic#
      default 3600 icmp#
      default 300 max - active - life#
      default 604800 tcp - fin#
      default 300 tcp - generic#
      default 3600 tcp - rst#
      default 120 udp#
      default 300
    }
  }
  sflow {
    agentid server {#
      multi - value port#
      default 6343
    }
  }
}

sFlow Configurations

Alcatel Switch

Enter your Scrutinizer server information:

sflow receiver 1 name address udp-port packet-size 1400 version 5 timeout 0

Receiver Name can be set to any one-word string you want (e.g. Scrutinizer). Port should be set to 2055 by default. Packet-size should be set to 1400, version should be 5, and timeout should be 0.

Next, configure a sampler on all desired interfaces:

sflow sampler 1 receiver 1 rate 1 sample-hdr-size 128

So, if you wanted to configure ports 18 and 35 to sample for a switch with a single blade and 48 ports, you would enter:

sflow sampler 1 1/18 receiver 1 rate 1 sample-hdr-size 128
sflow sampler 1 1/35 receiver 1 rate 1 sample-hdr-size 128

Finally, configure one poller to get sFlow counters:

sflow poller 1 receiver 1 interval 5

Write configuration to switch:

write memory

Arista Switch

Arista sFlow support

Blue Coat Packeteer Packet Shaper of Proxy

Blue Coat NetFlow Support

Brocade ICX series

I found that this config works on the MLXe series of routers and some ICX. sFlow is sampled NetFlow and with Brocade the sample rate is dependent on the interface speed.  With a higher sample rate, we will not see as granular data as we would with regular NetFlow. We recommend getting as close to 1 as possible for the best data. This may not be ideal for some users. Please keep in mind the current workload on your device before setting your sample rate to 1 to 1.

Sample Config:

(config)# interface ethernet 1/1 to 1/8fgs
(config-mif-0/1/1-0/1/24)# sflow forwarding
(config-mif-0/1/1-0/1/24)# exit
(config)# sflow destination <Scrutinizer’s IP Address> 2055
(config)# sflow sample <value 1 to X>

Link speed

Sampling Rate

10 Mb/s

1 out of 200

100Mb/s

1 out of 500

1 Gb/s

1 out of 1000

10 Gb/s

1 out of 2000

(config)# sflow polling-interval 30
(config)# sflow enable

You can also use the following command to list the configuration settings:

fgs# show sflow

I have found this configuration consistent across all of the MLXe series devices,along with compatibility with the ICX series (formerly Ruckus).

Brocade MLXe series

I found that this config works on the MLXe series of routers and some ICX. sFlow is sampled NetFlow and with Brocade the sample rate is dependent on the interface speed.  With a higher sample rate, we will not see as granular data as we would with regular NetFlow. We recommend getting as close to 1 as possible for the best data. This may not be ideal for some users. Please keep in mind the current workload on your device before setting your sample rate to 1 to 1.

Sample Config:

(config)# interface ethernet 1/1 to 1/8fgs
(config-mif-0/1/1-0/1/24)# sflow forwarding
(config-mif-0/1/1-0/1/24)# exit
(config)# sflow destination <Scrutinizer’s IP Address> 2055
(config)# sflow sample <value 1 to X>

Link speed

Sampling Rate

10 Mb/s

1 out of 200

100Mb/s

1 out of 500

1 Gb/s

1 out of 1000

10 Gb/s

1 out of 2000

(config)# sflow polling-interval 30
(config)# sflow enable

You can also use the following command to list the configuration settings:

fgs# show sflow

I have found this configuration consistent across all of the MLXe series devices,along with compatibility with the ICX series (formerly Ruckus).

Cisco Nexus 3000

For information on enabling sFlow on a Cisco Nexus 3000, view the Cisco Nexus configuration guide.

Cisco UCS server

How to configure NetFlow on Cisco UCS

Cumulus Networks OS

Cumulus Networks sFlow Configuration

Dell switch

Review the following sFlow setup guides depending on which series router you have:

Extreme (Enterasys) B3/C3/G3/B5/C5 Series switch

sFlow is only supported on Enterasys B3/C3/G3 series switches running firmware 6.3.1 or above. For information on enabling sFlow on these supported Enterasys® switches, please review the sFlow section of the Enterasys® SecureStack™ Configuration Guide, beginning on page 28-4.

Example Configuration for B5/C5 SecureStack™ hardware

The general procedure for configuring sFlow includes:

  1. Configure your sFlow Collector information to be used by the sFlow Agent on the switch. Up to eight Collectors can be configured. The information is stored in the sFlowReceiverTable.

  2. Enable and configure sFlow packet flow sampling instances on each port.

  3. Enable and configure sFlow counter sampling poller instances on each port.

The following is an example of the commands used to configure sFlow:

configure sFlow Collector 1 accept defaults for datagram size and port

set sflow receiver 1 owner enterasys timeout 180000
set sflow receiver 1 ip 192.168.16.91

configure packet sampling instances on ports 1 through 12 assign to sFlow Collector 1

set sflow port ge.1.1-12 sampler 1
set sflow port ge.1.1-12 sampler maxheadersize 256
set sflow port ge.1.1-12 sampler rate 2048

configure counter poller instances on ports 1 through 12 assign to sFlow Collector 1

set sflow port ge.1.1-12 poller 1
set sflow port ge.1.1-12 poller interval 20

ExtremeXOS Switch

View the PDF Guide, which references the commands to configure sFlow on Extreme Switches.

For more Extreme commands, view the ExtremeWare Command Reference Guide.

Force10 Switch or Router

The following commands configure a Force10 switch/router with IP address 1.1.2.2 to sample at 1-in-512 and send the sFlow packets to Scrutinizer with IP address 1.1.1.1 over UDP port 6343:

Force10(conf)#sflow collector 1.1.1.1 agent-addr 1.1.2.2
Force10(conf)#sflow sample-rate 512
Force10(conf)#sflow enable

sFlow must then be enabled on every interface that should be sampled:

Force10(conf-if-gi-0/0)#sflow enable

To list the configuration settings use the command:

Force10#show sflow
sFlow services are enabled
Global default sampling rate: 512
Global default counter polling interval: 20
Global extended information enabled: none
1 collectors configured
Collector IP addr: 1.1.1.1, Agent IP addr: 1.1.2.2, UDP port: 6343
20088 UDP packets exported
0 UDP packets dropped
3940 sFlow samples collected
0 sFlow samples dropped due to sub-sampling
Linecard 0 Port set 0 H/W sampling rate 512
Gi 0/0: configured rate 512, actual rate 512, sub-sampling rate 1

Fortinet Firewall

Read the Would you like to have some traffic visibility on your Fortinet Firewall? blog to get NetFlow setup instructions for the Fortinet Firewall.

Foundry Switch

There are only 3 commands to enable sFlow on Foundry gear.

Enable it globally

(config)# sflow enable

Configure a destination

(config)# sflow destination x.x.x.x

Enable it on port(s)

(config)# interface eth 1 (or for multiple ports (config)# interface eth 1 to 48)
(config-if-1)# sflow forwarding

For more Foundry commands, view the Foundry Command Reference Guide.

H3C MSR Series Router

View the 02-IP Services Volume(V1.05) Command Manual, which details the commands to configure sFlow on H3C MSR Series Routers.

H3C S12500 Series Switch

View the 13-Network Management and Monitoring Command Reference, which shows how to setup sFlow on H3C S12500 Series Routers.

H3C S5500-E1 or S7500-E Series Switch

View the PDF Guide, which references the commands to configure sFlow on H3C supported equipment.

HP Procurve Switch 2800 or 5300 series

IMPORTANT:

2800 Series must be running Software Revision I.08.105 and Firmware (ROM) version I.08.07 5300 Series must be running Software Revision E.10.37 or higher

For information on enabling sFlow on 2800 or 5300 series HP Procurve Switches, download this ZIP fileand review the PDF inside for further instructions.

HP Procurve Switch 5400, 3500 or 8200 series - running K code

HP has added support for configuring sFlow directly on the CLI.

From config mode:

Configure destination collector

sflow [1-3] destination [IP-addr] [udp-port-for-sflow]

Where 1-3 is the sFlow instance, IP-addr is the address of the Scrutinizer collector, and udp-port-for-sflow is the number of the listening port of the collector. example:

sflow 1 destination 192.168.1.1 6343

Activate Sampling

sflow [1-3] sampling [ports list] [N]

Where 1-3 is the sFlow instance, ports list is the port(s) setup for sFlow, and N is the number of sampled packets (to sample every 100 packets set N to 100). example:

sflow 1 sampling all 100

Activate Polling

sflow [1-3] polling [ports list] [N]

Where 1-3 is the sFlow instance, ports list is the port(s) setup for sFlow, and N is the number of interval (in seconds) between polling intervals. example:

sflow 1 polling all 60

Save Configuration

write mem

HP Procurve Switch 5400zl, 3500yl and 6200yl

For information on enabling sFlow on supported HP Procurves, view the ProCurve Networking FAQ.

Juniper Switch or Router

For instructions on how to enable sFlow on supported Juniper routers and switches, please review Configuring sFlow Technology for Network Monitoring (CLI Procedure).

Juniper EX 3200 switch

The following configuration enables sFlow monitoring of all interfaces on a Juniper EX3200 switch, sampling packets at 1-in-500, polling counters every 30 seconds and sending the sFlow to an analyzer (10.0.0.50) on UDP port 6343 (the default sFlow port).

  protocols {
  sflow {
    polling - interval 30;
    sample - rate 500;
    collector 10.0 .0 .50 {
      udp - port 6343;
    }
    interfaces ge - 0 / 0 / 0.0;
    interfaces ge - 0 / 0 / 1.0;
    interfaces ge - 0 / 0 / 2.0;
    interfaces ge - 0 / 0 / 3.0;
    interfaces ge - 0 / 0 / 4.0;
    interfaces ge - 0 / 0 / 5.0;
    interfaces ge - 0 / 0 / 6.0;
    interfaces ge - 0 / 0 / 7.0;
    interfaces ge - 0 / 0 / 8.0;
    interfaces ge - 0 / 0 / 9.0;
    interfaces ge - 0 / 0 / 10.0;
    interfaces ge - 0 / 0 / 11.0;
    interfaces ge - 0 / 0 / 12.0;
    interfaces ge - 0 / 0 / 13.0;
    interfaces ge - 0 / 0 / 14.0;
    interfaces ge - 0 / 0 / 15.0;
    interfaces ge - 0 / 0 / 16.0;
    interfaces ge - 0 / 0 / 17.0;
    interfaces ge - 0 / 0 / 18.0;
    interfaces ge - 0 / 0 / 19.0;
    interfaces ge - 0 / 0 / 20.0;
    interfaces ge - 0 / 0 / 21.0;
    interfaces ge - 0 / 0 / 22.0;
    interfaces ge - 0 / 0 / 23.0;
  }
}

Visit blog.sFlow.com for more information on configuring sFlow on Juniper switches.

ZyXEL Appliance

ZyXEL sFlow configuration

NetStream Configurations

3com Router or Switch

NetFlow (AKA NetStream) is supported on the 5000 & 6000 routers via a software upgrade and on the 8800 Switch via an NMM module.

To configure NetStream on a 3Com 5012 router, use the following sample configuration:

ip netstream export source interface
ip netstream export host

Then activate NetStream on each specific interface you want to obtain statistics from. For example, on the Serial0/0 interface, use the following command.

interface s0/0
ip netstream inbound

This will export inbound NetStream traffic statistics related to the Serial0/0 interface of the 3com router to the workstation running Scrutinizer.

IPFIX Configuration

Avaya Router

Avaya IPFIX Support

Avaya WLAN 8100 Wireless Controller

Avaya Wireless 8100 IPFIX Configuration

Barracuda Firewall

Barracuda IPFIX Support

Blue Coat Crossbeam Appliance

Blue Coat Crossbeam configuration

Brocade 5600 vRouter

Brocade 5600 IPFIX Configuration

Cisco NGA 3240

Visit the command reference page or click here

Citrix NetScaler sending AppFlow (IPFIX)

You can configure IPFIX on your Citrix NetScaler device using this setup guide.

Ecessa Appliance

Ecessa Appliances

Emulex EndaceFlow 3040

Emulex NetFlow Support

EndaceFlow 4004

Endace NetFlow Support

Extreme Switch

IPFIX support is available on the BlackDiamond 8900 G96Tc, G48T-xl, G48X-xl, and 10G8X-xl modules and Summit X460 and X480 switches.

To configure whether to meter on ingress and/or egress ports, use the following command:

configure ip-fix ports [ingress \| egress \| ingress-and-egress]
# The default is ingress.

To configure whether to meter all, dropped only, or non-dropped only records, use the following command:

configure ip-fix ports record [all \| dropped-only \| non-dropped]
# The default is all

F5 Networks Big-IP System

This configuration guide

Fortinet Switch

Fortinet IPFIX Support

Gigamon Appliance

These blogs provide information on the process.

IBM Proventia Network Intrusion Prevention Appliance

IBM Proventia IPFIX Support

Juniper MX240, MX480 or MX960 running JUNOS Release 10.2

To configure inline flow monitoring, include the inline-jflow statement at the [edit forwarding-options sampling instance instance-name family inet output] hierarchy level. Inline sampling exclusively supports a new format called version-ipfix that uses UDP as the transport protocol. When you configure inline sampling, you must include the version-ipfix statement at the [edit forwarding-options sampling instance instance-name family inet output flow-server address] hierarchy level and also at the [edit services flow-monitoring] hierarchy level.

The following operational commands include new inline fpc keywords to display inline configuration information: show services accounting errors, show services accounting flow, and show services accounting status.

To learn more click here for a listing (and description) of all features that have been added to JUNOS Release 10.2.

Juniper MX series post release 14.1X55

Juniper MX IPFIX Reporting

Juniper vMX

Juniper vMX IPFIX Support

Microsoft Event Logs

Monitoring failed login attempts with IPFIX

Nortel ERS 5500 & 8600 series routers

This Configuration Guide shows how to enable IPFIX using Java Device Manager (JDM) or with the Command Line Interface. (See Chapter 4).

NOTE: The 5500 series only supports IP packet sampling resulting in lower than actual utilization trends.

Utilization can be understated on Nortel IPFIX capable equipment. To fix this issue, review the hash overflow document.

nProbe

How to configure nProbe NetFlow IPFIX

Open vSwitch

This document on Open vSwitch explains the process

Procera Appliance

Procera IPFIX Support

Saisei Networks Appliace

Saisei IPFIX Support

Solera DeepSee Appliance

Solera IPFIX support

SonicWALL

The current supported models are TZ210, NSA240, 2400, 3500, 4500, 5000, NSA E-5500, 6500, 7500, 8500 running 5.8.0.1 or later.

Read the SonicWALL documentation on NetFlow and IPFIX support.

Sophos UTM Firewall

Configuring IPFIX on your Sophos UTM is done by enabling the IPFIX Accounting Feature.

sophosutmconfig

Read the Sophos documentation on IPFIX support. Page 126 outlines the IPFIX accounting feature.

Stormshield Appliance

Stormshield IPFIX Support

Ubiquiti Appliance

Ubiquiti NetFlow support

Viptela Appliance

Viptela IPFIX Support 

VMware DFW (Distributed Firewall)

VMware DFW IPFIX Support

VMware Virtual Distributed Switch (VDS)

VMware IPFIX Support

VMware vSphere ESX

VMware ESX support

Xirrus Wireless Access Point

Xirrus IPFIX support

YAF Flow Probe

YAF probe

jFlow Configurations

Juniper SRX Series Gateway

Configure J-Flow on a Juniper SRX

Juniper SRX100H

Juniper SRX100H NetFlow Support