
Netflow
This section covers the popular Netflow protocol orginally developed by Cisco System. Netflow is the de-factor industry protocol used to facilitate solutions to common network and security problems found in any size or type of network.
Below you'll find a number of articles covering Netflow analysis, configuration and tools that can be used to take advantage of the information and statistics Netflow can provide.
With Netflow, IT professionals, Network Administrators, Security Engineers and IT staff can keep an eye on their network, applications and budgets by performing:
Extensive Monitoring of LAN/WAN & Wi-Fi Links
- Analyze banwdith usage and identify bottleneacks
- Detect traffic spikes and network congestion
- Diagnose slow connections and sluggish network performance
- Provide complete visibility of bandwidth utilization
- Monitor critical links and network points
- Identify Wi-Fi bottlenecks and oversubscribed Access Points
- Monitor Wireless Controller links
Application Based Network Awareness
- Classify IP traffic and understand how trafic flows throughout the network
- Gain visibility in the traffic generated by different applications
Detect Security Related Events
- Detect abnormal traffic patterns
- Identify suspicious traffic during or out of business hours
- Detect unauthorized LAN or WAN traffic
- Detect Denial-of-Service Attacks & other undesirable network events
Reduce WAN Link Costs - Plan Network Upgrades
- Monitor your WAN usage including Top Talkers
- Verify and continiously monitor WAN traffic patterns
- Identify application usage and bandwidth hoggers
- Monitor SLA agreements with Telco Providers
Improve Network Troubleshooting - Reduce Time to Identify Problems
- Identify network pain points
- Gain network statistics and visibility to help troubleshoot issues
- Pinpoint network issues, link failures, time of event
- Creation of automated network alerts for different type of events
Quality of Service (QoS)
- Ensure QoS policies are configured according to your organisation's traffic requirements
- Confirm Class-of-Service (CoS) on your network devices and links is not over-subscribed or under-subscribed.