About Network Visibility Module
About Network Visibility Module
About Network Visibility Module
This feature allows you to choose whether you want the telemetry targeted as opposed to whole infrastructure
deployment. The NVM collects the endpoint telemetry for better visibility into the following:
• The device—the endpoint, irrespective of its location
• The user—the one logged into the endpoint
• The application—what generates the traffic
• The location—the network location the traffic was generated on
• The destination—the actual FQDN to which this traffic was intended
When on a trusted network, AnyConnect NVM exports the flow records to a collector such as Cisco
Stealthwatch or a third-party vendor such as LiveAction, which performs the file analysis and provides a UI
interface. Another third-party vendor such as Splunk may also provide a UI interface to see the reports. Since
most enterprise IT administrator want to build their own visualization templates with the data, we provide
some sample base templates through a Splunk app plugin.
Note If you are using NVM with Linux, make sure that you have completed the preliminary steps in Using NVM
on Linux.
Guidelines
• NVM is supported on Samsung devices running Samsung Knox version 2.8 or later. No other mobile
devices are currently supported.
• On mobile devices, connectivity to the collector is supported over IPv4 only. IPv6 is not supported.
• Data collection on Java based apps is not supported.
Note The Network Visibility Module sends flow information only when it is on the trusted network. By default,
no data is collected. Data is collected only when configured as such in the profile, and the data continues to
be collected when the endpoint is connected. If collection is done on an untrusted network, it is cached and
sent when the endpoint is on a trusted network.
If TND is configured in the NVM profile, then the trusted network detection is done by NVM and does not
depend on VPN to determine if the endpoint is in a trusted network. However, if TND isn't explicitly configured
in the NVM profile, NVM uses the TND feature of VPN to determine if the endpoint is in a trusted network.
Also, if VPN is in a connected state, then the endpoint is considered to be on the trusted network, and the
flow information is sent. The NVM-specific system logs show TND use. Refer to AnyConnect Profile Editor,
Preferences (Part 2) for information about setting the TND parameters.
• Desktop or Mobile—Determines whether you are setting up NVM on a desktop or mobile device.
Desktop is the default. Mobile will be supported in the future.
• Collector Configuration
• IP Address/FQDN—Specifies the IPv4 or IPv6 IP address/FQDN of the collector.
• IP Address/FQDN—Specifies the IPv4 address/FQDN of the collector.
• Port—Specifies at which port number the collector is listening.
• Cache Configuration
• Max Size—Specify the maximum size the database can reach. The cache size previously had a
pre-set limit, but you can now configure it within the profile. The data in the cache is stored in an
encrypted format, and only processes with root privileges are able to decrypt the data.
Once a size limit is reached, the oldest data is dropped from the space for the most recent data.
• Max Duration—Specify how many days of data you want to store. If you also set a max size, the
limit which reaches first takes precedence.
Once the day limit is reached, the oldest day's data is dropped from the space for the most recent
day. If only Max Duration is configured, there is no size cap; if both are disabled, the size is capped
at 50MB.
• Periodic Flow Reporting(Optional, applies to desktop only)—Click to enable periodic flow reporting.
By default, NVM sends information about the flow at the end of connection (when this option is disabled).
If you need periodic information on the flows even before they are closed, set an interval in seconds here.
The value of 0 means the flow information is sent at the beginning and at the end of each flow. If the
value is n, the flow information will be sent at the beginning, every n seconds, and at the end of each
flow. Use this setting for tracking long-running connections, even before they are closed.
• Throttle Rate—Throttling controls at what rate to send data from the cache to the collector so that the
end user is minimally impacted. You can apply throttling on both real time and cached data, as long as
there is cached data. Enter the throttle rate in Kbps. The default is 500 Kbps.
The cached data is exported after this fixed period of time. Enter 0 to disable this feature.
• Collection Mode—Specify when data from the endpoint should be collected by choosing collection
mode is off, trusted network only, untrusted network only, or all networks.
• Collection Criteria— You can reduce unnecessary broadcasts during data collection so that you have
only relevant data to analyze. Control collection of data with the following options:
• Broadcast packets and Multicast packets (Applies to desktop only)—By default, and for efficiency,
broadcast and multicast packet collection are turned off so that less time is spent on backend
resources. Click the check box to enable collection for broadcast and multicast packets and to filter
the data.
• KNOX only (Optional and mobile specific)—When checked, data is collected from the KNOX
workspace only. By default, this field is not checked, and data from inside and outside the workspace
is collected.
• Data Collection Policy—You can add data collection policies and associate them with a network type
or connectivity scenario. You can apply one policy to VPN and another to non-VPN traffic since multiple
interfaces can be active at the same time.
When you click Add, the Data Collection Policy window appears. Keep these guidelines in mind when
creating policies:
• By default, all fields are reported and collected if no policy is created or associated with a network
type.
• Each data collection policy must be associated with at least one network type, but you cannot have
two policies for the same network type.
• The policy with the more specific network type takes precedence. For example, since VPN is part
of the trusted network, a policy containing VPN as a network type takes precedence over a policy
which has trusted as the network specified.
• You can only create a data collection policy for the network that applies based on the collection
mode chosen. For example, if the Collection Mode is set to Trusted Network Only, you cannot
create a Data Collection Policy for an Untrusted Network Type.
• If a profile from an earlier AnyConnect release is opened in a later AnyConnect release profile
editor, it automatically converts the profile to the newer release. Conversion adds a data collection
policy for all networks that exclude the same fields as were anonymized previously.
• Data Collection Policy for Knox (Mobile Specific)—Option to specify data collection policy when mobile
profile is selected. To create Data Collection Policy for Knox Container, choose the Knox-Only checkbox
under Scope. Data Collection policies applied under Device Scope applies for Knox Container traffic
also, unless a separate Knox Container Data Collection policy is specified. To add or remove Data
Collection Policies, see Data Collection Policy description above. You can set a maximum of 6 different
Data Collection Policies for mobile profile: 3 for Device, and 3 for Knox.
• Acceptable Use Policy (Optional and mobile specific)—Click Edit to define an Acceptable Use Policy
for mobile devices in the dialog box. Once complete, click OK. A maximum of 4000 characters is
allowed.
This message is shown to the user once after NVM is configured. The remote user does not have a choice
to decline NVM activities. The network administrator controls NVM using MDM facilities.
• Trusted Network Detection—This feature detects if an endpoint is physically on the corporate network.
The network state is used by NVM to determine when to export NVM data and to apply the appropriate
Data Collection Policy. Click Configure to set the configuration for Trusted Network Detection. An
SSL probe is sent to the configured trusted headend, which responds with a certificate, if reachable. The
thumbprint (SHA-256 hash) is then extracted and matched against the hash set in the profile editor. A
successful match signifies that the endpoint is in a trusted network; however, if the headend is unreachable,
or if the certificate hash does not match, then the endpoint is considered to be in an untrusted network.
Note When operating from outside your internal network, TND makes DNS requests
and attempts to establish an SSL connection to the configured server. Cisco
strongly recommends the use of an alias to ensure that the name and internal
structure of your organization are not revealed through these requests by a machine
being used outside your internal network.
If TND is not configured in the NVM profile and if the VPN module is installed, then NVM uses the
TND feature of VPN to determine if the endpoint is in a trusted network. TND configuration in the NVM
profile editor includes the following:
1. https://—Enter the URL (IP address, FQDN, or port address) of each trusted server and click Add.
2. Certificate Hash (SHA-256)—If the SSL connection to the trusted server is successful, this field is
populated automatically. Otherwise, you can set it manually by entering the SHA-256 hash of the
server certificate and clicking Set.
3. List of Trusted Servers—You can define multiple trusted servers with this process. (The maximum
is 10.) Because the servers are attempted for trusted network detection in the order in which they are
configured, you can use the Move Up and Move |Down buttons to adjust the order. If the endpoint
fails to connect to the first server, it tries the second server and so on. After trying all of the servers
in the list, the endpoint waits for ten seconds before making another final attempt. When a server
authenticates, the endpoint is considered within a trusted network.
Save the profile as NVM_ServiceProfile.xml. You must save the profile with this exact name or NVM
fails to collect and send data.
OS Name
OS Version
SystemManufacturer
OS Edition
Interface UID
Interface Index
Interface Type
Interface Name
Interface Details List State and SSID, attributes of InterfaceDetailsList. Indicate the
network state of the interface (trusted or untrusted), and the SSID
of the connection.
Interface MAC address Windows and Mac OS only
Empty for Android, not supported.
Start Sec The absolute timestamp of the start or end of the flow.
End Sec
Process Name
Process Hash
DNS Suffix Configured on the interface associated with the flow on the
endpoint.
L4ByteCountIn
L4ByteCountOut
Destination Hostname Actual FQDN that resolved to the destination IP on the endpoint
Interface UID
Note Periodically NVM also sends information about the endpoint identity.