If your SevOne appliance has more than one Network Interface Card (NIC) run the following command one time.
echo
0 >
/proc/sys/net/ipv4/conf/all/rp_filter
This topic describes how to enable flow devices to send flow data to SevOne NMS. This workflow is outside of the SevOne NMS application and may not present all of the steps your network requires to enable devices to send flow data. If the following instructions are not applicable for your network please reference the device manufacturer's documentation.
This is a brief list of devices and the corresponding commands to set up flow. If your device is not in this list, it does not mean SevOne NMS does not support your device. Contact the device vendor for instructions to enable flow. Only people with Cisco or similar device configuration experience should perform flow setup.
The typical manufacturer setting is for a router to send flow data every 30 minutes. Sometimes referred to as the flow cache timeout, this setting defines the frequency that a router sends the flow table to the collector (SevOne NMS). This implicitly is the limit to which the router allows a flow to grow before breaking the flow into a new flow.
SevOne recommends that you configure routers to send flow data every one minute in order to have the router report to SevOne NMS in a timely manner that enables the even distribution of information transfer. Should you choose to set the flow source flow timeout configuration to something other than one minutes, the router reports less frequently and sends SevOne NMS larger flow tables which results in less granular report data. To compensate for this, SevOne NMS FlowFalcon reports provide a Granularity setting that enables you to view the report at the granularity that matches your router flow timeout configuration. A flow cache timeout other than one minute is not recommended.
The SevOne NMS Cluster Manager > Cluster Settings tab provide a Drop Long Flows option that enables you to define a time limit for what you consider to be a long flow. When you use the Drop Long Flow option, SevOne NMS hides the traffic from routers that send flows that exceed the Max Flow Duration you enter. When a router sends flows that exceed the Max Flow Duration, an administrative message appears upon log on to inform administrators that flows from a specific router have been dropped. The Drop Long Flows feature is useful when you set the router cache timeout to be shorter than the Max Flow Duration you set in SevOne NMS, because long flows would then indicate that a router is misconfigured.
The Cluster Manager > Cluster Settings tab provides the ability to adjust the interval at which SevOne NMS writes flow data to the database. The write interval sets the time window for which raw data is to be aggregated into the minimal aggregation. The Write Interval should be set to one minute. In the rare situation where you decide to change this setting, you should consider that every hour SevOne NMS takes flow data and creates 15 minute aggregations for the top <n> flows for each interface and view. Your Write Interval setting should therefore be divisible by 15 when you intend to use aggregated flow data.
Flow Source Flow Timeout Configuration Considerations |
||
Applicable Use Cases |
Flow Source Flow Timeout Configuration |
SevOne NMS FlowFalcon Report Settings |
Billing AND Bursting Monitoring (Recommended). This is the optimal SevOne NMS setting for typical NetFlow reporting |
1 Minute |
Leave the Display Setting Granularity set to the default "Auto". |
Acceptable |
2-5 Minutes |
Set the Display Setting Granularity to 5 minutes |
Not Recommended |
5 Minute + |
On the classic FlowFalcon Reports page, in the Display Settings section, click the Granularity drop-down and select Custom. Set the granularity time span to twice the router flow timeout. On the Report Attachment Wizard, on the Settings page, FlowFalcon tab, click the Granularity drop-down and select 30 minutes. |
Enter the following command to enable Cisco Express Forwarding which is required for flow in most recent IOS releases.
router(config)
# ip cef
In the configuration terminal on the router, enter the following commands to start NetFlow Data Export (NDE).
The address of your SevOne NMS appliance.
router(config)
# ip flow-export destination <SevOne-IP> 9996
The source interface is used to set the source IP address of the NetFlow exports sent by the router.
router(config)
# ip flow-export source loopback
Sets the export version number.
router(config)
# ip flow-export version 5 and 9
Breaks up long-lived flows into one minute segments.
router(config)
# ip flow-cache timeout active 1
Ensures the flows that have finished are exported in a timely manner.
router(config)
# ip flow-cache timeout inactive 15
Enter the following commands to enable NetFlow on each physical interface from which to collect a flow (not VLANs and Tunnels because they are automatically included). This is normally an Ethernet or WAN interface. You may need to set the speed of the interface in kilobits per second especially for frame relay or ATM virtual circuits.
router(config)
# interface <interface>
router(config)
# ip route-cache flow or ip flow ingress or ip route-cache cef
Write your configuration with the write or copy run start command.
When in enabled mode, enter the following command to view current NetFlow configuration and state.
Shows the current setup.
router
# show ip flow export
Summarizes the active flows and displays how much NetFlow data the router exports.
router
# show ip cache flow
router
# show ip cache verbose flow
Enter the following global commands.
router
# ip flow-export source
router
# ip flow-export version 5 or 9
router
# ip flow-export destination <SevOne-IP> 9996
router
# ip flow-cache timeout active 1
Enter the following command on each physical interface. You must log on to each interface one at a time.
router
# interface <interface>
router
# ip route-cache flow
The address of your SevOne NMS appliance.
router
# set mls nde <SevOne-IP> 9996
Sets the export version.
router
# set mls nde version 9
Breaks up long-lived flows into ~two minute segments.
router
# set mls agingtime long 128
Ensures that flows that have finished are exported in a timely manner.
router
# set mls agingtime 64
This sets the flow mask to full flows.
router
# set mls flow full
CatOS 7.(2) or higher is required for this command, which enables NDE for all traffic within the specified VLANs rather than just inter-VLAN traffic.
router
# set mls bridged-flow-statistics enable
Enables NDE.
router
# set mls nde enable
Enter the following global commands (all commands are entered in the router <enable> config option).
Sets the export version.
router
# ip flow-export source
router
# ip flow-export version 9
router
# ip flow-export destination <SevOne-IP> 9996
router
# mls nde sender version 9
Breaks up longlived flows into oneminute segments.
router
# mls aging long 64
Ensures that flows that have finished are exported in a timely manner.
router
# mls aging normal 64
If you have a Supervisor Engine 2 or 720 running IOS version 12.1.13(E) or higher the next two commands are required to put interface and routing information into the NetFlow exports.
router
# mls flow ip interface-full
router
# mls nde interface
Enter the following command on each physical interface. You must log on to each interface one at a time.
router
# interface <interface>
router
# ip route-cache flow
By default, all flows are Router Generated. However, when match interface input and match interface output are added to the device configuration, it results in interface index information to be emitted.
This series requires a Supervisor Engine IV with a NetFlow Services daughter card to support NDE.
In the configuration terminal on the router, enter the following command to start NetFlow export.
router
# ip flow-export version 9
router
# ip flow-export destination <SevOne-IP> 9996
Enter the following command to enable NetFlow on each physical interface.
router
# interface <interface>
router
# ip route-cache flow infer-fields
Juniper supports flow exports by sampling packet headers with the routing engine and aggregating them into flows. Packet sampling is achieved by defining a firewall filter to accept and sample all traffic, applying that rule to an interface, and then configuring the sampling forwarding option.
To configure inline flow monitoring, include the inline-jflow statement at the [edit forwarding-options sampling instance instance-name family inet output] hierarchy level.
In line sampling supports the version-ipfix format that uses UDP as the transport protocol. To configure in line sampling, include the version-ipfix statement at the [edit forwarding-options sampling instance instance-name family inet output flow-server address] hierarchy level and at the [edit services flow-monitoring] hierarchy level.
The following operational commands include in line fpc keywords to display in line configuration information.
show services accounting errors
show services accounting flow
show services accounting status
The Juniper Web Site lists all features that were added to JUNOS Release 10.2.
You configure sFlow technology, designed to monitor high speed switched or routed networks, to continuously monitor traffic at wire speed on all interfaces simultaneously.
Enter the following command to configure the IP address of the SevOne NMS appliance.
[edit protocols sflow]
user@switch
# set collector <SevOne-IP>
Enter the following command to configure the UDP port on the collector. The default UDP port on SevOne NMS is 6343.
[edit protocols sflow]
[edit protocols sflow] 6343
Enable sFlow technology on a specific interface.
[edit protocols sflow]
user@switch
# set interfaces interface-name
You cannot enable sFlow technology on a Layer 3 VLAN-tagged interface. You cannot enable sFlow technology on a LAG interface. sFlow technology can be enabled on the member interfaces of the LAG.
Enter the following command to specify how often the sFlow agent polls the interface.
[edit protocols sflow]
user@switch
# set polling-interval seconds
Enter 0 (zero) to not poll the interface.
Enter the following command to specify the rate at which to sample packets.
[edit protocols sflow]
user@switch
# set sample-rate number
You can also configure the polling interval and sample rate at the interface level. The interface level configuration overrides the global configuration.
[edit protocols sflow interfaces]
user@switch
# set polling-interval seconds
[edit protocols sflow interfaces]
user@switch
# set sample-rate number
The following configuration enables sFlow monitoring for all interfaces on a Juniper EX switch, sampling packets at 1-in-500, polling counters every 30 seconds and sending the sFlow to SevOne NMS <SevOne-IP> on UDP port 6343.
protocols {
sflow {
polling-interval 30;
sample-rate 500;
collector <SevOne-IP> {
udp-port 6343;
}
interfaces
ge
-0
/0/0
.0;
interfaces
ge
-0
/0/1
.0;
When you enable cflowd on an Alcatel service interface, cflowd collects routed traffic flow samples through a router for analysis. Cflowd is supported on IES and VPRN services interfaces. Layer 2 traffic is excluded. All packets forwarded by the interface are analyzed according to the cflowd configuration. On the interface level, cflowd can be associated with a filter (ACL) or an IP interface.
When you enable cflowd on an interface, all packets forwarded by the interface are subject to analysis according to the global cflowd configuration.
When you configure the cflowd interface option in the config>router>interface context, the following requirements must be met to enable traffic sampling on the specific interface.
Enable cflowd
Select the interface>cflowd interface option
To omit certain types of traffic from being sampled when the interface sampling is enabled, you can enable the config>filter>ip-filter>entry>interface-disable-sample option via an ip-filter or ipv6-filter. You must apply the filter to the service or network interface on which the traffic to be omitted is to ingress the system.
Enter the following command.
Interface Configurations
CLI Syntax: config>router>
if
#
cflowd {acl|interface}
no cflowd
Depending on the option selected, either acl or interface, cflowd extracts traffic flow samples from an IP filter or an interface for analysis. All packets forwarded by the interface are analyzed according to the cflowd configuration.
Enable the acl option to enable traffic sampling on an IP filter. You must enable Cflowd (filter-sample) in at least one IP filter entry.
Select the interface option to enable traffic sampling on an interface. If cflowd is not enabled (no cflowd) then traffic sampling does not occur on the interface.
The example below includes the use-vrtr-if-index command. You can use this command to export flow data using interface indexes (ifIndex) instead of using the Alcatel internal global IF index IDs.
Service Interfaces
CLI Syntax: config>service>vpls service-
id
# interface ip-int-name
cflowd {acl|interface}
active-timeout 20
inactive-timeout 10
overflow 10
rate 100
use-vrtr-
if
-index
collector <SevOne-IP>:9996 version 8
aggregation
as-matrix
raw
exit
description <SevOne NMS>
exit
collector <SevOne-IP>:9996 version 8
aggregation
protocol-port
source
-destination-prefix
exit
autonomous-system-
type
peer
description
"Neighbor collector"
exit
SevOne NMS supports most flow formats.
If flow data does not display for the device, confirm that SevOne NMS actually receives the data via tcpdump.
Log in to the box and run one of the following commands.
Enter the following command to show all incoming flow traffic to SevOne NMS.
$ tcpdump -i eth0 port 9996
Enter the following command to show only flow traffic from a specific IP address.
$ tcpdump -i eth0 port 9996 |
grep
'<ip address in question>'
If data comes into SevOne NMS, you should eventually see a message similar to the following:
Example: 17:55:47.934113 IP <ip address question>.49359 > \ <SevOne>.9996: UDP, length 1464
If no data comes in from the IP address, there may be a routing issue.
If flow data comes in, but nothing displays, the version may be wrong.
Enter the following command to dump the first portions of the packets to the page.
$ tcpdump -XX -i eth0 port 9996
Something similar to the following should display.
Example:
19:55:26.326485 IP <source>.52292 > <destination>.9996: UDP, length 1416
0x0000: 0030 482d 9e1b 0011 5d24 aec0 0800 4500 .0H-....]$....E.
0x0010: 05a4 f187 0000 fb11 ce64 0aff ff0c cc1b .........d......
0x0020: 2435 cc44 270c 0590 2b9f 0005 001d cada $5.Dâ...+.......
0x0030: 5584 45a3 f32e 0cd7 dd44 8682 7d8d 0001 U.E......D..}...
0x0040: 0000 aa94 ....
19:55:26.326609 IP <source>.58101 > <destination>.9996: UDP, length 1428
0x0000: 0030 482d 9e1b 0011 5d24 aec0 0800 4500 .0H-....]$....E.
0x0010: 05b0 b449 0000 f611 810a 0a00 8f98 cc1b ...I............
0x0020: 2435 e2f5 270c 059c fa38 0007 001b cdb8 $5..â....8......
0x0030: 2bdc 45a3 f32e 11a3 844e 29a1 03b4 0000 +.E......N).....
0x0040: 0000 0a33
In the above example, the first traffic is v5 and the second is v7 as indicated in the third row's sixth column. The last two digits in the column are the version.
The following is a visual aid to help find the version as indicated by the XX.
Example:
-::.----- IP <source>.----- > <destination>.9996: UDP, length ----
0x0000: ---- ---- ---- ---- ---- ---- ---- ---- ----------------
0x0010: ---- ---- ---- ---- ---- ---- ---- ---- ----------------
0x0020: ---- ---- ---- ---- ---- --XX ---- ---- ----------------
0x0030: ---- ---- ---- ---- ---- ---- ---- ---- ----------------
0x0040: ---- ----