NetVizura 4.4.0 User Guide
NetVizura 4.4.0 User Guide
GENERAL
1. Dashboard added
2. Getting Started guide added
3. Java 8 support added
4. Windows OS supported added (for server installation)
5. Windows troubleshooting added
6. Call-to-action buttons added to Live Demo and Free Trial applications
7. NetFlow exporter limit removed from Free Trial license
8. System requirements updated
9. PostgreSQL logs are now created with the date in the filename and are rotated daily
10. Other minor bugs fixed
NETFLOW ANALYZER
1. All Traffic Pattern provided by default
2. End User Traffic performance optimized
3. High traffic performance optimized
4. Minor GUI improvements made
5. IP addresses in Scheduled Reports bug fixed
6. Other minor bugs fixed
MIB BROWSER
1. MIB module parsing bux fixed
The following instructions are intended for users with administrator privileges (application
and server) and a basic familiarity with netflow export and device configuration.
In this chapter we will guide you through the installation and basic setup related actions:
System Requirements
Downloading NetVizura
NetVizura Installation
Configuring Network Devices
License
NetVizura Update
Unlimited Contact us
(50,000+ fps)
To learn more on how
calculation is made or how
General assumptions: 30 days of Archive and 365 days of Database history stored. to make your own custom
HDD space estimation, see
NV NetFlow HDD
calculator.xlsx.
These are recommended server requirements based on the assumptions given
in the table above. Average flows processed and monitoring counters impact all
parameters (CPU, RAM and HDD). Archive and Database storing time also
impacts HDD space and may require additional external storage.
NetVizura comes with built-in database which will be installed on the NetVizura
server. You can use a different server for your database to achieve better
performance but note that NetVizura only supports PostgreSQL version 9.3+.
NetFlow Analyzer Raw Data files are stored on the NetVizura server. You can
store them in some other storage, but keep in mind that it can have a
considerable impact on the performance due to large files being transferred
across your network between the NetVizura server and Raw data files storage.
EventLog Analyzer
These are recommended server requirements based on the assumptions given in the
table above. Maximum messages processed and applied alarms impact all parameters
(CPU, RAM and HDD). Database storing time also impacts HDD space and may require
additional external storage.
MIB Browser
Software Requirements
Supported OS
OS Versions and Distributions Notes
Linux Debian Debian Wheezy 7 (64 bit), Required for DEB package
Linux Ubuntu Ubuntu Precise 12.04 (64-bit) Required for DEB package
Ubuntu Trusty 14.04 (64-bit)
Chrome 35.0+ -
Firefox 26.0+ -
Free Trial licence with evaluation period of 30 days from the day of installation includes the
following functional restrictions:
To upgrade your
NetFlow module allows you to process up to 500 flows per second from unlimited number Free Trial or
of exporters Commercial
EventLog module allows you to process unlimited number of messages from up to three license, read more
exporters at Upgrading
MIB module has no functional restrictions License.
If you want to
transfer your
configuration from
old software
version to new
one, see more at I
mporting/Exporting
Configuration.
NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Netvizura depends on Oracle Java 1.8, Tomcat 7 and PostgreSQL 9.3 or higher. NetViz Allocation
ura relies on 3rd-party repositories for installation of these software packages.
Install the NetVizura package downloaded from the website with the command:
dpkg -i downloaded_file_name.deb
Username: admin
Password: admin01
For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netviz
ura like in the screenshot below:
4 GB 2 GB 1 GB 1 GB
16 GB 10 GB 5 GB 1 GB
Tweaking PostgreSQL
Tweaking PostgreSQL for best performance is a topic on which many books were written,
but the following are some common sense suggestions. For the curious ones recommended
reads (among countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning
Guide, this article and this book.
During installation NetVizura automatically allocates memory for Tomcat process. The
amount allocated to Tomcat process is calculated according to the formula:
3 GB 1 GB
4 GB 1 GB
16 GB 5 GB
However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):
NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Netvizura depends on Oracle Java 1.8, Tomcat 7 and PostgreSQL 9.3 or higher. Allocation
NetVizura relies on 3rd-party repositories for installation of these software packages.
Install the NetVizura package downloaded from the website with the command:
dpkg -i downloaded_file_name.deb
Username: admin
Password: admin01
For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:
4 GB 2 GB 1 GB 1 GB
16 GB 10 GB 5 GB 1 GB
Tweaking PostgreSQL
Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.
During installation NetVizura automatically allocates memory for Tomcat process. The amount
allocated to Tomcat process is calculated according to the formula:
For instance:
3 GB 1 GB
4 GB 1 GB
16 GB 5 GB
NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Before installing NetVizura you will have to install: Oracle Java 1.8, Apache Tomcat 6 Allocation
and PostgreSQL 9.3 or higher, in that order.
3. in the folder where the file is downloaded execute command yum -y localinstall
pgdg-centos95-9.5-2.noarch.rpm
After this steps, install the NetVizura package downloaded from the website with the command yu
m -y localinstall downloaded_file_name.rpm
Username: admin
Password: admin01
For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:
For instance:
4 GB 2 GB 1 GB 1 GB
16 GB 10 GB 5 GB 1 GB
Tweaking PostgreSQL
Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.
During installation NetVizura automatically allocates memory for Tomcat process. The amount
allocated to Tomcat process is calculated according to the formula:
For instance:
3 GB 1 GB
4 GB 1 GB
16 GB 5 GB
CentOS-6.5-x86_64-Minimal.ISO: http://wiki.centos.org/Manuals/ReleaseNotes/CentOSMi
nimalCD6.5;
various dependency packages: sudo, Java-jdk-7u51-linux-x64, Tomcat6,
postgresql93-server;
NetVizura RPM installation package.
Some hypervisors can bypass boot scripts using its own OS installation rules
from selected templates.
When you create VM for netvizura-x.y.z-linux.iso, do not use any hypervisor
templates which refer to some OS.
Select Other from selection menu, attach netvizura-x.y.z-linux.iso on virtual
CD controler and boot ISO straight from virtual CD.
If Welcome screen (shown in the first step below) appears d
uring boot, then the installation is properly launched.
This will lead you to complete installation of NetVizura software with all necessary software
dependency packages.
Select IP version support option (either Enable IPv4 support or Enable IPv6 support)
Select suboption:
Dynamic IP configuration (DHCP): Choose this option if you have DHCP server
in your network and wait for NetworkManager to configure your network interface.
Manual configuration: Choose this option for manual network configuration
It is very important to set the correct UTC time in your BIOS setup because traffic
analysis, charts and logs depend on it.
Also, set the time before installation. Time change after the installation will invalidate the
license!
Step 6: Post installation scripts will automatically install NetVizura RPM package.
Some hypervisors like xencenter will not run automatic booting. You will be prompted
again in welcome screen and asked to choose an option. Now, you should choose
option "Boot from local drive":
Username: admin
Password: admin01
For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:
Step 1: Download and install Oracle Java 8 from Oracle official website www.oracle.com/technetw
ork/java/javase/downloads/index.html
Step 2: Download and install Tomcat 7 or Tomcat 8 as a service from Tomcat official website tomc
at.apache.org. 32-bit/64-bit Windows Service Installer is available on the downloads page.
When prompted for the installation type, choose Full installation. This will enable Tomcat to start on
boot.
Step 3: Download and install PostgreSQL 9.3+ from PostgreSQL official website http://www.postgr
esql.org/download/windows/
While installing PostgreSQL you will be prompted for password; make sure that
you type in "postgres"!
Make sure you have exactly one version of PostgreSQL installed on your
system, otherwise NetVizura might not work as expected or at all.
Step 4: Download NetVizura Windows Installer from NetVizura website and run installer with
Username: admin
Password: admin01
For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:
4 GB 2 GB 1 GB 1 GB
16 GB 10 GB 5 GB 1 GB
Tweaking PostgreSQL
Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.
In order to apply following tweaks edit file postgresql.conf, this file is usually located in
PostgreSQL data folder. You will need to restart the PostgreSQL service after done editing. Almost
all of the following parameters are commented with carron character (#). Be aware that if you
comment out the parameter that has been changed, PostgreSQL will revert to the default value.
During installation NetVizura automatically allocates memory for Tomcat process. The amount
For instance:
3 GB 1 GB
4 GB 1 GB
16 GB 5 GB
However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):
2. In Java tab under Java options modify the -Xmx parameter to allocate additional memory
to Tomcat. Additionally, set parameter -Xms to the same amount. Also set Initial memory
pool and Maximum memory pool to the same amount. This should look like on picture
below.
3. Back to the General tab, click Stop and Start to restart Tomcat.
Exporters - network devices capable of netflow statistics export (for instance routers or L3
switches).
Server - the computer that collects netflow statistics from exporters. This is also
the computer on which NetVizura NetFlow Analyzer is installed.
On the figure above you can see that interfaces Gi1/1 and Gi1/2 are set to collect NetFlow traffic,
Gi1/1 in IN direction and Gi1/2 in OUT direction. This example shows that a flow traveling from
Host A to Host B will be collected and exported twice to NetFlow server, while a flow traveling from
Host B to Host A will not be matched and exported. The result is a false NetFlow traffic: double
amount of flows for A to B direction, and zero flows for B to A direction.
It is very important that all interfaces on a single device are configured to collect flow in
only one direction, IN or OUT.
Here, both interface Gi1/1 and interface Gi1/2 are set to collect the NetFlow traffic in IN direction.
This time, a flow traveling from Host A to Host B will be collected only once, and a flow traveling
from Host B to Host A will be collected as well. Now, NetFlow traffic will be correct and none of the
charts in TopN > Exporters will have duplicated data.
Ingress or Egress?
Ingress export enabled on all the interfaces of a device will in general deliver all necessary
information. It is specially recommended in the following situations:
1. NetFlow v9 supports Ingress and Egress, but NetFlow v5 only supports Ingress flows. If
your device is only supported by NetFlow v5, your flows should necessarily be Ingress.
2. In addition, Ingress export provides monitoring of Blocked traffic (traffic sent to Interface
Out 0).
1. Some routers (e.g. Cisco WAAS, Riverbed, etc.) have option to compress flows, so the
Out traffic will be significantly larger than In traffic. Egress export provides more precise
information on traffic transferred in the network.
2. When multicast flows are sent, Ingress exported flows have a destination interface 0
because the router doesn’t know interface Out before processing. Egress exported flows
deliver the destination interfaces, and in addition if the flow is headed for multiple
interfaces it will be exported as multiple flows.
This article will help you decide which devices exactly to choose as necessary for your netflow Choosing Traffic to
export and overcome these challenges. Export
Incomplete
Traffic Export
Choosing Traffic to Export Complete
Traffic Export
The basic principle is to export only the traffic that is of your interest. For this reason, it is Deciding Whether
necessary for you first to understand well your network topology and flow routing. to Use Automatic
Deduplication
For example, you can export netflow only from devices in data center and regional units, and not Automatic
from branch locations. Or, if you want to make Traffic Pattern that captures all internal company's Deduplication
traffic where part of the traffic passes via central router and part passes directly between other Disabled
routers, then you should export from all these routers. Automatic
Deduplication
Incomplete Traffic Export Enabled
Automatic
Deduplication
Not Possible
This is a situation when netflow traffic is not exported for one part of the network. The traffic that
passes through the central router (Host A to Host B) will be captured, while traffic that does not
pass via central router (Host C to Host D) will not.
Since Exporters charts present data as they are actually exported by devices, none of the Exporter
traffic will have duplicated data.
However, when you create Traffic Patterns and Subnet Sets they may include data exported by
multiple exporters and as a consequence netflow data will be duplicated. This naturally depends on
which devices are configured as exporters, as well as traffic routing and network topology.
When automatic deduplication is disabled, a flow traveling from Host A to B and passes via
multiple exporters, NetFlow Server will receive same flow from R1, R2 and R3 so flow will be proce
ssed three times.
Automatic deduplication solves this problem based on the next hop - when an exporter exports a
flow, and this flow includes IP address of another exporter as next hop information, then the flow
will be skipped by the Traffic Pattern/Subnet Set counter.
For example, when three consecutive routers in the flow route are exporting flows then NetVizura
will have enough information to skip flows from R1 and R2 (since R2 and R3 exporters are
mentioned as next hop) and include only flow from R3 in the Traffic Pattern.
In order to achieve automatic flow deduplication in Traffic Patterns and Subnet Sets, it is
required that ALL devices in flow continuity are configured as exporters.
However, sometimes not possible to achieve automatic deduplications. For example, if device is
not NetFlow export capable, when part of the network is managed by third party (ISP) or if
exporting from too much devices is not desired.
It is recommended that only users with experience in configuring Cisco devices follow
these steps.
This section offers a brief guide for setting up NetFlow on a Cisco router or switch. For more
detailed information, refer to the Cisco website.
Device Supported
The following is an example of a basic router configuration for NetFlow. NetFlow basic functionality
is very easy to configure. NetFlow is configured on a per interface basis. When NetFlow is
configured on the interface, IP packet flow information will be captured into the NetFlow cache.
Also, the NetFlow data can be configured to export the NetFlow data to the NetFlow Server.
1. Configuring the interface to capture flows into the NetFlow cache. CEF followed by NetFlow
flow capture is configured on the interface
Router(config)# ip cef
Router(config)# interface ethernet 1/0
Router(config-if)# ip flow ingress
Or
Either ip flow ingress or ip route-cache flow command can be used depending on the Cisco
IOS Software version. IP flow ingress is available in Cisco IOS Software Release 12.2(15)T or
above.
2. For exporting the NetFlow cache to the NetFlow Server. A version or a format of the NetFlow
export packet is chosen and then the destination IP address of the server (in this example
172.22.23.7). The 2055 is the UDP port the NetLow Server will use to receive the UDP export from
the Cisco device. 2055 is a default value, you can change this as described in chapter Configuring
the service settings on page 141 (Collection port).
The following is an example of NetFlow on a Cisco Catalyst 6500 Series Switch. The Cisco
Catalyst 6500 Series Switch has two aspects of NetFlow configuration, configuration of hardware
based NetFlow and software NetFlow. Almost all flows on the Cisco Catalyst 6500 Series Switch
are hardware switched and the MLS commands are used to characterize NetFlow in hardware.
The MSFC (software based NetFlow) will characterize software based flows for packets that are
punted up to the MSFC.
The hardware switched flows use the MLS commands to configure NetFlow. Remember that for
the hardware based flows NetFlow is enabled on all interfaces when configured.
The following is the configuration for NetFlow on the MSFC for software based flows. This
configuration is equivalent to what is shown in Cisco Catalyst 6500 Series Switch Platform NetFlow
Configuration. The user configures NetFlow per interface to activate the flow characterization and
also configures an export destination for the hardware and software switched
flows.
interface POS9/14
ip address 42.50.31.1 255.255.255.252
ip route-cache flow (also ip flow ingress
can be used)
ip flow-export version 5 (The export
version is setup for the software flows
exported from the MSFC)
ip flow-export destination 10.1.1.209 2055
(The destination for hardware and software
flows is specified)
More Information on the Cisco Catalyst 6500 Series Switch NetFlow Configuration can be viewed
at Cisco website.
Figures above show the redirection of traffic (port mirroring) to the server on which the NetFlow
Daemon Server is started. When the port mirroring is started on a switch, interface to whom all
traffic is directed to becomes useless for normal device communication. It only passes all of its
traffic (In and Out) from port mirroring interface.
The problem is: How to export netflow traffic if the interface on which the NetFlow Daemon
Server is connected to is unusable for normal communication?
Now, it is possible to start the netflow probe on the NetFlow Daemon Server. One of these
applications is the SoftFlowd that has the possibility of exporting netflow traffic locally (127.0.0.1) to
the UDP port on the same server or to a UDP port on a remote server.
Above figures show examples of local netflow export and remote netflow export.
One of these tools is Samplicator. It is a software packege for Linux that listens to UDP datagrams
at defined port and sends copies to set of other IP addresses we define.
How to do it:
In This example NetFlow Samplicator Server receives traffic from exporter 10.0.0.254 via port
2000, then sends copies to multiple NetFlow Servers via port 2055:
Option Description
-d Debug level
samplicate -h
NetVizura, by default, includes built-in support for Snare OpenSource agent. Installation and
configuration of Snare agent is described in the following steps.
If you have another Syslog agent then you can create a separate rule for that agent: End User
Settings.
Download Snare OpenSource Syslog agent from the official website, www.intersectalliance.com.
Install Snare OpenSource agent on domain controller and/or Windows working station by following
these instructions.
If you have followed previous steps carefully, you will be able to access Remote Control Interface
using your browser of choice.
To access Remote Control Interface paste http://localhost:6161/ into your address bar in your
browser and press Enter.
In order to fully configure Snare OpenSource agent to work correctly with NetVizura follow these
steps.
1. Network configuration
Click on Network Configuration on the left side of the Control Interface. Locate Destinati
on Snare Server address field and put IP address of your NetVizura server here.
Open NetVizura application, and navigate to > Settings > NetFlow Settings >
Configuration and search for End users collection port value.
By default collection port should be set to 33515. Locate Destination Port field in Snare
Remote Control Interface and paste the port value from NetVizura Settings configuration.
To finish network configuration check Enable Syslog Header checkbox. Click Change
Configuration to save changes.
2. Objectives Configuration
By now, you should have your Snare agent successfully installed and configured to work with
NetVizura.
Follow step 4 to make sure that NetVizura is actually receiving Syslog messages from Snare
agent.
Next, check if Snare agent is sending syslog to Netvizura collector by running tcpdump.
sudo
yum
tcpdump port 33515 updat
e
sudo
Once again, default port value is used. In case some other value is configured through Settings,
replace that value into provided command. yum
insta
After running tcpdump command, you shoud see packets incoming to your server from
workstations or domain controller.
ll
tcpdu
Windows mp
If you are running NetVizura on Windows Server, you can use packet analyzer tools for windows (
wireshark, windump, etc).
Use the debugging level with caution when configuring logging trap level, because it can
generate a large amount of syslog traffic in a busy network.
Example
Example
NetFlow Analyzer license depends on the number of flows you are exporting to NetVizura
server, regardless of the number of exporters (routers and switches) and their interfaces
involved. You can collect data from as many devices as you need and the total number of flows will
reflect your network traffic volume.
With this approach you have a possibility for a wider usage of NetFlow software across
your network and choose the license that best fits your network traffic volume.
EventLog Analyzer license has no limitations on number of exporters or syslog and SNMP traps
received.
License Upgrade
License Renewal
After we receive the Installation Code, we will send you your license key in one working day. Note
that you can apply the license key to your existing installation keeping your configuration and data.
Should you experience any difficulties with application of your licence key, do not hesitate to email
us at [email protected].
To do this:
1. Log in as admin
2. Go to Top N > System
3. Click Flows tab
4. Choose the Last Month in the Time Window
In the Number of flows graph you will notice peaks in traffic. These peaks will tell when you had the
highest rate of flows exported by your devices. When you choose the
Commercial license, be
Max Total stored value in the table will give you the maximum number of flows per second sure to choose the one that
exported by your network devices (highest peak) for the selected Time Window. has the flow per second
limit reasonably higher than
the maximum. This will
ensure that you are able to
analyse data peaks that
On Free Trial license, Unlicensed flows mean that your network exports more than 500 correspond to traffic
fps limit. You should take into consideration both Processed and Unlicensed flows for anomalies or security
your Commercial license. issues like Denial of
Service Attack.
On Commercial license, Unlicensed flows mean that your network devices are exporting
more flows than your current Commercial license allows.These flows will not be
processed and, therefore, information provided by them will not be included when
creating and displaying traffic statistics. In this case, you should upgrade your
Commercial license.
In any case, after your current maintenance and support expires you need to purchase a new
license key that allows software update and support tickets. For help with payment requests, get in
touch with us at [email protected].
For the new license key, you should provide us with your Installation Code.
Error rendering macro 'excerpt-include' : No link could be created for 'Upgrading License'.
1. NetVizura might
NetVizura requires working connection to the internet to install required update. After
not work properly if
update is successful you can turn off internet access for NetVizura server.
updated from more
older versions. We
kindly urge you to
first successively
Step-by-step guide update it to
previous version,
1. Check free space on disk with df -h command. If there is less than 8GB of free space on and then to current
disk, delete some files to make at least 8GB available space on disk (easiest way is to version.
delete old raw data files in archive which is usually located in /var/lib/netvizura/fl 2. NetVizura will not
ow/archive) work if update is
2. Download and run script that automates upgrade of prerequisite software: made after support
period has expired.
Make sure that
your support has
not expired before
wget you start updating.
https://www.netvizura.com/files/updates/ne 3. It is not possible to
tvizura-4.4.0-update-prerequisites-debian. update NetVizura
on free trial. If you
sh --output-document=/tmp/update-prerequis want to extend
ites-debian.sh your assessment
for one additional
sudo month, please
bash /tmp/update-prerequisites-debian.sh request a new free
trial license.
When presented with the dialog about Tomcat configuration files being upgraded
choose answer "Keep localy installed version", which is the default. Press Enter to
proceed.
dpkg -i /tmp/netvizura-x.y.z-linux.deb
In case you have previously installed NetVizura 4.3.1 or 4.3.2 in the location other than
C:\Program Files\NetVizura we strongly recommend you to perform clean install of the
latest version. Read more.
1. Check free space on disk. If there is less than 8GB of free space on disk, delete some
files to make at least 8GB available (easiest way is to delete old raw data files in archive
which is usually located in C:\Program Files\NetVizura\flow\archive)
2. Download NetVizura update package from NetVizura official website
3. Unzip the package with Extract All... option from Windows context menu
To update from version 4.3.1 or 4.3.2 to a version newer than 4.3.3 you will first have to
perform update to version 4.3.3 using update package for versions 4.3.1 and 4.3.2
available on NetVizura website. After that you can update to any subsequent version
using Windows installer for that version.
1. NetVizura might
NetVizura requires working connection to the internet to install required update. After
not work properly if
update is successful you can turn off internet access for NetVizura server.
updated from more
older versions. We
kindly urge you to
first successively
Step-by-step guide update it to
previous version,
1. Check free space on disk with df -h command. If there is less than 8GB of free space on and then to current
disk, delete some files to make at least 8GB available space on disk (easiest way is to version.
delete old raw data files in archive which is usually located in /var/lib/netvizura/fl 2. NetVizura will not
ow/archive) work if update is
2. Download and run script that automates upgrade of prerequisite software: made after support
period has expired.
Make sure that
your support has
wget not expired before
https://www.netvizura.com/files/updates/ne you start updating.
tvizura-4.4.0-update-prerequisites-ubuntu. 3. It is not possible to
update NetVizura
sh --output-document=/tmp/update-prerequis on free trial. If you
ites-ubuntu.sh want to extend
your assessment
sudo for one additional
bash /tmp/update-prerequisites-ubuntu.sh month, please
request a new free
trial license.
When presented with the dialog about Tomcat configuration files being upgraded
choose answer "Keep localy installed version", which is the default. Press Enter to
proceed.
dpkg -i /tmp/netvizura-x.y.z-linux.deb
Initial Configuration
General Initial Configuration
NetFlow Initial Configuration
EventLog Initial Configuration
Navigation
General Navigation
Dashboard Navigation
NetFlow Navigation
EventLog Navigation
MIB Navigation
You can also add more admin accounts and delete the default one. To see more details about
managing your account, see My Account. To learn more about managing users, go to Managing Tip
Users.
Adding email to an admin
account will ensure that the
admin gets critical system
messages such as license
messages, low disk space
etc.
Creating Users
To enable multiple users to access NetVizura, you need to create user accounts.
Note that it may take up to 10 minutes to see traffic from a new exporter. This is the time
needed for the application to create the finest sample of traffic since one sample lasts 5 minutes
and two samples are needed to draw a line on the chart.
If you use Snare as your Syslog agent, then you can use one of the provided mapping performance penalty. For
rules. In this case, just update Source IP field, verify if rule is matching users and change best results consider
changing Source IP to
status to Active. To do so, go to > Settings > NetFlow Settings > End Users. more specific value or
concrete IP address.
If rule for your Syslog agent is not provided with NetVizura by default, you should create
your own rule in order to successfully map users (link username with an IP address at
specific time). Read more about how to setup custom End User mapping rule in the the
article Configuring End Users.
Note that it may take up to 10 minutes to see traffic for a new user. This is the time needed for
the application to create the finest sample of traffic since the sample lasts 5 minutes and two
samples are needed to draw a line on the chart.
1. Devices are exporting syslog and trap messages to the same port that NetVizura
EventLog is listening to.
2. Messages are passing the network firewall and reaching the NetVizura Server
3. NetVizura Server Ports to which syslog and trap messages are sent is open
By default, syslog messages are exported from the devices to port 514, while NetVizura listens on
the port 33514 in Linux systems and on the port 514 in Windows systems. If you use Linux
systems, you need to (1) redirect syslog messages to the 33514 on NetVizura server, (2) export
syslog messages to 33514 from device, or (3) change NetVizura EventLog configuration. Same
applies to trap socket port.
On Linux systems ports lower than 1024 can not be used by application, unless the root
privileges are given to NetVizura EventLog.
To change NetVizura EventLog configuration go to > Settings > EventLog Settings >
Configuration and under Service options change the Socket port values.
General Navigation
Dashboard Navigation
NetFlow Navigation
EventLog Navigation
MIB Navigation
The Top navigation bar consists of the following options from left to right:
1. Module Menu - shows available modules and active module (highlighted in blue).
2. User Menu - shows current user and allows access to Log-out and My Account options.
3. Settings Menu - link to Settings, Getting Started wizard, website Homepage and About
information.
4. Time Window Menu - sets time window for which data will be displayed in a module.
Module Menu
Module Menu shows all modules available to the logged in user. You can set which modules will
be seen by each user in > Settings > Control Panel > Users. (Read more in User Settings).
To choose a module simply click on the module name. Active module will be highlighted in blue.
User Menu
User Menu shows currently logged in user
(username and user type) and allows
access to options Log Out and My Account.
To Log-out or get to My Account simply
hover over User Menu and choose the
desired option.
Note that guest users (user type guest) can not change My Account settings since it is a
shared account. For more information on user types, go to User Settings page.
Settings Menu
Settings Menu allows you to go to Settings mode, Getting Started wizard, website Homepage and
view About information.
Note that display options depend on the user type and permissions: Control Panel is only
visible to NetVizura administrators (user type admin), module setting is only visible if the
user has permission to see the module, editing module data is only possible if user has
write privileges for the module etc.
About information
About shows:
1. Shortcuts –
history, previous
and next Time
Window value
2. Standard List –
predefined time
interval list: Last
Hour, Last 6
Hours, Last 12
Hours, Last
Day, Last Week,
Last Month
3. Custom Fields
– any time
interval (dates,
hours or
minutes) picker
Time Window is independent from the views and modules i.e. no matter where you navigate and
what statistics you select to view, TIme Window value will remain the same and will be applied to
the data shown (if applicable).
1. Active Alarms - indicating how many alarms are currently active by level (emergency,
alert, critical, etc.)
2. Dashlets - showing most important traffic nodes (all traffic, interfaces, services,
conversations, users) and most recent alarms
When NetFlow module is selected the Flow main screen will show, as shown on the picture below. NetFlow Analyzer
Note that data displayed will be according to Time Window value: if Time Window is set to Last User Interface
Day, charts and tables will show netflow traffic that occurred in the last 24h. Navigating TopN
Navigating Raw
Data
First let us define main parts of the NetFlow Analyzer user interface:
1. Mode Panel – choose between the TopN and Raw Data mode
Only users with NetFlow write module permission can see Raw Data mode
To make navigation easier for you, several indicators (blue or white highlights) show where you are
and what you are doing – which mode, option, graph, etc. you are currently using or setting. On the
figure above you can see that the selected Mode is TopN, selected Menu option is Exporter (San
Francisco is the active node), and that selected Tab options is Interface - this results in Main Panel
showing the TopN interfaces for exporter San Francisco.
Navigating TopN
4. Favorite nodes
6.
3. Selected node - active node for which the traffic is displayed in the Main Panel
4. Traffic distribution (Tab Panel) – traffic distribution by subnets (Traffic Pattern view only),
interfaces (Exporter view only), hosts, conversations, services, protocols, QoS and AS
5. Chart and table (Main Panel) – traffic values for the selected node by selected distribution
during time set in Time Window
6. Side Panel – two small charts showing (bits, packets or flow traffic), PDF reports and
refresh options
In Figure above you can see TopN host (4) for Traffic Pattern All Traffic (3) during last 6 hours (1).
You can also see that the top host is 172.16.1.41.
By selecting the Raw Data menu option, you will be able to inspect raw data files in the Main panel.
You can also notice the Raw Data Tree right under the Raw Data menu option. Raw Data Tree
groups raw data files in folders according to day/hour/minute. Note that Raw Data Tree will show
raw data files for the specified time period set in Time Window.
1. Select check boxes next to files you want to inspect and click Show Selected
2. Select a single file in the Raw Data Tree and click Show Selected
Raw Data includes vast quantity of information about each single flow. Unpacking
many files would require significant processing power and memory space, and therefore it
is suggested to select and view only a few files at a time.
By clicking on the Show selected, Raw Data Table will open showing the information from selected
raw data files.
When EventLog module is selected main screen will show the following parts:
1. Mode Panel - choose between the Syslog and SNMP Trap mode.
2. Main Panel - displays results of SNMP request and MIB search operations.
For the purpose of this chapter, we will focus on the navigation in the Syslog mode.
To view syslog go to EventLog module and click Syslog tab. Here you can see syslog
messages sent from different exporters for a chosen Time Window. On this page:
1. Show Options
2. EventLog Chart Show Options
3. Severity Table Syslog Chart
4. Exporter Table Severity Table
5. EventLog Table Exporter Table
Syslog Table
Table and charts will show logs that have (1) the same severity as set in Severity Table (2) for
the time set in Time Window. For these logs Exporter table will show distribution by exporters
and Severity Table will show distribution by log's severity.
For example, on the screenshot to the left, you can see that logs that occurred during the
selected Time Window and severity 0 to 5 are shown. You can also see that there was 523,918
such logs (Severity Table) of which most numerous were Warnings (55%) and Errors (29%).
You can also see the distribution of these logs by exporters in the Exporter table: exporter
x.x.6.201 generated the most logs (139,130).
Show Options
Show Options:
Chart shows number of logs in certain time chunks (1 minute, 1 day, 1 hour). Width of the chart
bars and number of bars depends on the Time Window selected. See table below:
Chart has two axis: numerical y-axis and time x-axis. Numerical axis shows the number of logs
per bar. Time shown on the x-axis of the chart is the same time as set in the Time Window.
Next to the Syslog Chart is the Severity Table in which you can select if syslog messages of the
certain severity will be displayed on the chart or not. Colors on the chart correspond with the
colors of the syslog Severity in the Severity Table.
On the EventLog Chart above you can see that one bar on the chart represents logs during 30
seconds (bar = 30 seconds).
Severity Table
Syslog Table
EventLog Table shows messages with selected severity (in Severity Table) that were received
during time set in the Time Window. For each message Date, Exporter, Severity, Facility and
Message content is displayed. Severity levels are shown with the corresponding color, as in the
chart and Severity Table. 9/19 Figure 7: Exporter Table Figure 6: Severity Table Syslog Table
can be filtered by Exporter, Severity, Facility and Message content. Note that the filters can be
activated by selecting items in the Severity and Exporter Tables, as described above. To clear
all filters, click the Clear button above the Syslog chart. To show exporter DNS names, click the
Show Names button above the Syslog chart.
On the screenshot above, you can see that MIB ifTable is selected in the MIB tree and that after
SNMP request the Main Panel shows the ifTable with OID values for the currently selected device
(cisco3550-xxx). In the Details it is visible that the ifTable OID is .1.3.6.1.2.1.2.2.
Devices added in the > Settings > MIB Settings > Devices will show in the list of
devices and will be always available.
Instant devices are user added devices that will not be saved in the database (the list will
be cleared after logout). Instant devised are used if you want to quickly check an OID on
a device but do not want the device to be stored for later use.
Using Dashboard
Using NetFlow
Basic NetFlow Usage
Advanced NetFlow Usage
Using EventLog
Viewing Syslog Messages
Inspecting Syslogs
Viewing SNMP Traps
Understanding Eventlog System Traffic
Using EventLog Alarms
Syslog How to...
Using MIB
Searching OIDs
Setting Current Device
Making SNMP Request
Managing MIB Favorites
Reading MIB Details
Active Alarms
Top Interfaces
All Traffic
Top Subnet Sets
NetVizura Dashboard includes the following widgets: Top Services
Top Conversations
1. Active Alarms Top End Users
2. Top Interfaces
3. All Traffic Overview
4. Top Subnet Sets
5. Top Services
6. Top Conversations You might want to display
7. Top End Users this Dashboard on the large
wall screen in your office.
Everyone in the team
Most of the widgets require correct setup of All Traffic Pattern. Read more how to check
would be able to spot
and modify All Traffic Pattern.
immediately a new alarm or
when atypical network
traffic occurs, and in this
way improve visibility,
collaboration and incidence
response time.
Active Alarms
Here you are able to check how many alarms are currently active in your network.
Alarms are presented in real-time, in a donut chart so that you can get an overview about their
proportion, as well as in their own cards for you to quickly determine distribution of alarms by
severity.
Above screenshot shows 63 currently active alarms, where 24 of them belongs to emergency
level, 1 to error, 12 to notice and 26 to debug.
Clicking on the alarm level in the chart or on the card leads to Alarm module where you can see
more details and actions.
Top Interfaces
With Top Interfaces widget you are able to determine which interfaces "eat" most of the bandwidth
in your network. This may help you to better organize/balance your network or to influence budget
plan for improvements in your network infrastructure.
All Traffic
In All Traffic widget you are able to see total traffic in your network (from all exporters, in all
subnets, including internal and external network). It shows three charts - bits/s, packets/s, flows/s
so that you can compare them in relation to one another. This enables you to immediately spot if
there are any irregularities impacting your entire network (for example, normal bits/s and packets/s
charts with increased flows/s chart suggest some kind of network attack).
Clicking on the particular chart or unit in the legend leads to the dedicated chart in the NetFlow
module where you can further investigate your network behavior and identify potential causes for
concern.
Top Services
Here you can see which services are most common in your network. This helps network
administrators to better control traffic which passes through the network.
Clicking on the chart leads to All Traffic > Services distribution, and clicking on the specific services
additionally highlights it.
Top Conversations
This widget provides glimpse on the conversations most involved in your network traffic.
Clicking on the legend (Upload/Download) leads to All Users overview, whereas clicking on a
specific user goes to his/hers detailed analysis.
Traffic Distributions (Top Talkers) - how network traffic is split by categories (such as
hosts, conversations, QoS etc.).
Using Charts and Tables - how to use charts and tables showing network traffic
Exporters and Interfaces Traffic - how to view traffic for exporters and their interfaces
Basic Traffic Patterns - how to start analyzing logical structures of network traffic,
independent of the physical infrastructure.
Subnet Sets - how to analyze statistics for group of Subnets (IP ranges) or smaller
Subnet Sets.
Favorites - how to manage frequently monitored nodes.
Details - how to view additional information for a selected node.
Reports - how to export traffic to PDF file or schedule a report.
Throughput Chart (area and bar time chart) - time diagram, which represents one or
Throughput Chart
more parameters within the selected time frame allowing you to follow changes in traffic
View Options
and recognize traffic trends with ease.
Zooming
Volume Chart
Volume Chart (pie chart) - distribution of Top N bandwidth consumers in a pie chart form,
Table
allowing you to easily visualize and compare bandwidth consumers with each other.
IP Address
Resolution
Table (text table) - in addition, Throughput and Volume charts are followed below by a
Additional Options
corresponding top-talker table. Top-talker table shows entities most contributing to the
Set Metrics
traffic showed on Throughput and Volume charts.
Side Charts
Top Talker
Isolation
Charts and tables are network element and time specific. In other words, each chart and table
Top Talker
shows traffic for a selected node in the Navigation tree for the given TIme Window.
Drill-Down
Top Talker
Highlight
Throughput Chart
Throughput is a time chart enabling you to see large number of parameters in an arbitrary time
interval (set by Time Window). This is particularly suitable for viewing changes in the traffic over
time, spotting traffic trends and anomalies:
On the graph, positive part of the y-axis shows outbound (Out) traffic, while negative part of the
y-axis shows inbound (In) traffic. Out traffic is traffic originated from the internal network to
external network, while In traffic is traffic destined to the internal network from external network.
The Top-talker table below will show average and maximum values for In and Out traffic
achieved during the given time interval, as well as Total traffic in the selected
measurement unit (bps, pps, fps) and as percentage of total traffic for each table entry.
View Options
Throughput chart can be seen as area or bar chart. Area chart enables you to see the flow of traffic
more smoothly, while bar chart gives you the ability to view traffic by each sample. Use the area
chart for spotting trends and over-viewing the traffic of large time intervals. Use the bar chart when
solving problems and when you need more details on the sample level (time interval you are
inspecting is relatively small).
To switch between the area and bar chart click the Area chart or Bar chart button. This will give
you a chart as shown in screenshot below. Re-selecting the option will give you the original view
back.
You can zoom in and out of the Throughput chart. This enables you to quickly and more directly
select the time window you are interested in (in comparison to the time Time Window).
To zoom in:
1. Move the cursor over the chart (cursor will turn from arrow to hand).
2. Position the mouse to the beginning of the time interval you are interested in.
3. Press and hold the left mouse button.
4. Drag the cursor to the end of the time interval you are interested in
5. Release mouse button
Chart and table are now showing the traffic for the interval you have just set.
To zoom out, simply click
on the zoom out icon in the
right-hand corner of the
Throughput bar. This will
set the previous time
interval as active time
interval.
TIme Window is in sync with zoom in and out meaning that zooming will set a new Time
Window value. The Top-talker table is adjusted to show traffic for the zoom time interval.
Zooming in also activates the zoom out icon (beside area or bar chart icon).
Volume is a pie chart enabling you to easily visualize top-talkers in regard to total traffic and
each other, for the given Time Window.
There are two charts, for inbound (In) and outbound (Out) traffic.
Top-talker table will show total traffic volume values if Volume chart option is active. It
will show values in the selected measurement unit (bytes, packets, flows) and as
percentage of the total traffic for each table entry.
Table
Text table shows average, maximum and total values for top-talker contributes. Additional
columns, such as In, Out, Src or Dst, will show if applicable.
Table can be sorted by any column in decreasing or increasing order. Selecting the column again
will switch between decreasing, increasing and no ordering. Table also shows if there were any
alarms during the selected Time Window for all top-talkers.
"Others" entry in the charts and table (in gray) represents traffic not belonging
to top-talkers. Only exception to this is the display of Subnets where “Others” entry
represents all values that are matched to a traffic but not matched with any defined
subnet for that traffic.
In order to enable IP address resolution, your NetVizura server should have local or
remote communication with DNS server (for Hostname) and Internet access (for Whois
information).
For this reason, NetVizura provides IP address resolution (Hostname, Geo-location and Whois
information) that significantly saves time, improves readability of the statistics and increases
overall contextual awareness.
As you can see in the screenshot above, this end user had two bigger downloads at around 16h
from two IP Addresses belonging organization Akamai Technologies, located in United States.
Additional Options
Set Metrics
As a measurement unit for the observed traffic, the charts and table can show:
Side Charts
To the right of the main chart with selected measurement, you can see also two other
measurements:
You can isolate contribution of any top talker by clicking on the top talker name in the table. This
will reload the chart to show the contribution of the selected top talker only.
In the example above you can see top conversations. If you click on the second conversation
A.B.1.44 => C.D.13.230 : HTTP : TCP, chart will reload to show the selected conversation traffic
only (screenshot below).
To cancel the top talker isolation, click on the top talker name again.
If a top talker is an exporter, interface, Subnet or Subnet Set, clicking on the its name will result in
the jump to that top talker in the Node Tree rather then the top talker isolation. The jump occurs
because more detailed traffic for that top talker is available by jumping to its node then by simply
isolating it on the chart.
In the example above (first screenshot) you can see top interfaces of an exporter. If you click on
the first interface Vl9, you will jump to that interface to view its traffic in more details (second
screenshot above).
To highlight a top talker on the chart or table, simply click on it in the chart or on its table cell in the
table. Chart field and table row will become highlighted:
Distribution by Interfaces
Distribution by Hosts
Distribution by Conversations
Distribution by Services
Distribution by Protocols
Distribution by QoS
Distribution by AS
The Menu Panel Navigation Tree presents interfaces belonging to the selected exporter. Main
Panel shows throughput or volume chart and table statistics for bits, packets or flows for the
selected Time Window. Note that top talkers for bits, packets and flows can differ (e.g. a top talker
by flows may not be a top talker by bits).
Screenshot above gives an example of exporter traffic distribution by interface for the exporter
named New York Core router. From six interfaces of the New York Core router, the top talkers by
bits are: New Orleans, Miami and Boston interfaces. You can also see that more than 90% of all
traffic passing through the New York Core router passes through these three interfaces.
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Host from the Tab panel
In order to enable IP
address resolution, your
NetVizura server should
have local or remote comm
unication with DNS server
(for Hostname) and Internet
access (for Whois
information).
The screenshot above indicates that over 90% of outgoing traffic came from first and third host in
the table.
Besides that, if you move your mouse over some host, you can see Whois information that
significantly saves time, improves readability of the statistics and increases overall contextual
awareness.
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node (Exporter, Interface, Traffic Pattern, Subnet Set, Subnet or End User)
from the Node Tree
3. Choose Conversation from the Tab panel
Exporter Traffic
Interface Traffic
Viewing Traffic
Patterns
Viewing Subnet
Set Traffic
Subnet Traffic in
Subnet Sets
The screenshot above indicates that top conversation is between X.X.190.17 and X.X.3.38, using
HTTPS service and TCP protocol. It is also notable that the conversation consumed Max 6.7 Mbps
of Out traffic and 149.4 kbps of In traffic.
For each conversation participant, additional DNS and WHOIS lookup are performed. IP is
presented as Hostname, whereas WHOIS description is shown in a tooltip when specific
conversation is hovered. Tooltip contains information about organization name and address,
network range, additional description and more, depending on data availability. In screenshot
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Service from the Tab panel
The screenshot above indicates that on Melburn interface belonging to Beijing Core Router top
services consumed are MS-SQL, misrosoft-ds, HTTP-Proxy and netbios-ssn.
Services are applications identified by the TCP/UDP ports they use. To display
the name of a service instead of its TCP/UDP port number, it is necessary to
previously map the TCP/UDP ports with service’s names. See more at Configuri
ng Service.
In some cases, VPN traffic can be forwarded through TCP port 443 thus service
s traffic (SSH, HTTP, etc.) will be masked as HTTPS.
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Protocol from the Tab panel
The screenshot above indicates that on the San Francisco exporter TCP and UDP are the main
protocols. Other protocols with minor traffic are also presented.
NetVizura gives the possibility of viewing the traffic which is transferred over IP
protocols (such as TCP, UDP, ICMP, etc.). All protocols are monitored and
analyzed over a standardized protocol number used in IP packets and received
from netflows.
In order to perform the network traffic analysis in a way that best suits your
needs, you might need to define some protocols not included in NetVizura. To
learn how to define new protocols, go to Configuring Protocol
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose QoS from the Tab panel
The screenshot above indicates two main QoS used on the New York's router's St. Louis interface
- Default and CS6. It is also noted that at 12h when major increase of Default traffic occurred, CS6
traffic simultaneously experienced a significant drop.
NetFlow Analyzer can show the traffic between two autonomous systems. This can be
done by obtaining the information about Src AS and Dst AS from the netflow data. In
order to make this possible, the network device that is exporting netflow data (Exporter)
must have a full BGP table. This is because the network communication between
autonomous systems is done via BGP network protocol, and, therefore, information
about Src and Dst AS are known through BGP.
1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose AS from the Tab panel
In order to view Exporters and Interface Traffic, you first need to configure your network
devices to send netflow data to NetVizura. After that, exporters and its interfaces will
automatically appear in the node tree as they start making traffic. Read more at Configuri
ng Network Devices for NetFlow Export.
This chapter covers viewing traffic for all exporters, single exporter and single interface; and
explains how exporter and interface name discovery works.
To select this view, go to TopN > Exporters option and select All Exporters node.
The Navigation Tree in the Menu Panel shows exporters with their belonging interfaces, and Main
Panel shows top exporters or interfaces (throughput or volume, in bits, packets or flows). Exporter
tab will show which exporters have the most traffic passing through them, while Interface tab will
show you which interfaces have the most traffic passing through them in your network.
Figure above shows an example of top exporters traffic. You can see that out of four exporters
(Beijing, New York, Paris and San Francisco Core Routers) exporter New York Core router has by
far the most traffic in flows passing through it.
To see traffic for an exporter, go to TopN > Exporter option and select the desired exporter node.
The Navigation Tree in the Menu Panel shows interfaces of the selected exporter, while Main
Panel shows traffic for for the selected exporter (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Hosts tab will give you top hosts for the selected exporter).
Figure above shows traffic of the New York Core Router by hosts. You can see that top three hosts
that generated traffic via that exporter are X.X.51.7, X.X.198.10 and X.X.1.41, where X.X.51.7 is
also the top Source while X.X.1.41 is the top Destination host.
To see traffic for an interface, go to TopN > Exporter option, select the desired exporter and then
the desired interface node.
The Navigation Tree in the Menu Panel shows interfaces of the selected exporter, while Main
Panel shows traffic for for the selected interface (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Service tab will give you top services for the selected interface).
Figure above shows service traffic for the interface Miami. You can see that HTTP and HTTP
Proxy services were mainly used via that interface.
In order to complete exporter names discovery, it is required to have basic network Exporters and
administration knowledge and access to network devices. Interfaces
Discovery
Also, you need administrator privileges for setting up SNMP policies in NetVizura Control Exporters Removal
Panel.
First time when NetFlow Analyzer receives and processes netflow packets from a network
device, it is automatically added to Exporters tree. Device initially appears as IP address (configure
d for NetFlow export), and its interfaces appear with dedicated SNMP indexes.
Exporters Removal
During the course of work, you might have old exporters that no longer send NetFlow data but are
still available in the tree. For this reason, you might want to clean them up. To remove an exporter:
In order to view Traffic Patterns, you first need to setup Traffic Patterns of your interest.
After that, they will automatically appear in the node tree. Check out Traffic Pattern
Settings.
This chapter introduces the concept of Traffic Patterns, viewing traffic for a single Traffic Pattern,
viewing statistics for a single Subnet in Traffic Pattern tree, and explains what are the differences
between Exporter Traffic and Traffic Pattern.
Traffic Pattern is a part of the totally collected network traffic. It represents the
traffic between two networks, namely:
Internal Network - usually represents the whole or part of your internal network
(company network) from which the NetFlow data are exported and collected
External Network - can be an arbitrary network – other part of your
network (such as a network in another city, database center etc),
Internet provider's network, or the whole Internet.
The traffic between the Internal Network and External Network is always bidirectional. This means
that the Traffic Pattern will match the traffic going from the Internal Network to External Network,
and from the External Network to Internal Network. The statistics are generated for the traffic
between Internal and External Networks separately in two opposite directions, referenced from the
Internal Network perspective:
Outgoing (Out) traffic – going out of the Internal network or, in other words, traffic sourced
from the Internal Network and destined to the External Network.
Incoming (In) traffic – coming into the Internal network or, in other words, traffic sourced
from the External Network and destined to the Internal Network.
There are three types of Traffic depending on the direction of traffic in regards to you Internal
network:
Self Traffic - within one network. In other words, source and destination of the traffic are
both within a single network. Naturally, the network in question has to be within your
internal network. In this case, your internal network (or its part) is both Internal Network
and External Network.. In the case of Self Traffic, outbound traffic volume is the same as
the inbound traffic volume.
Normal Traffic - between two different networks (network IP ranges do not overlap).
Usually, one of these network is your company' network (or its part) and some external
network such as the whole Internet or some specific network like Facebook.
Custom Traffic - a combination of Self-Traffic and Normal Traffic. For example, if you
want to track the entire network communication of your PR department. This means
tracking (1) to witch part of your company network did they communicate with and (2) to
which networks outside of your company network did they communicate with. The Internal
Network is your PR department and the External Network is all networks except PR
department network.
To show a Traffic Pattern, go to TopN > Traffic Patterns option and select the node of your
interest.
The Navigation Tree in the Menu Panel shows Traffic Patterns and their Subnets, while Main Panel
shows traffic data for for the selected Traffic Pattern (throughput or volume, in bits, packets or
flows) or its subnet. Clicking on any tab option will show traffic distribution by that category (e.g.
clicking on the Subnets tab will give you top Subnets for the selected Traffic Pattern).
Figure above shows Facebook Traffic. You can see that US Data Centers subnet takes the most of
Facebook Traffic, followed by US high schools and FIFA Main servers, whereas US colleges
subnet takes the least.
To see traffic for a Subnet, go to TopN > Traffic Patterns option, select the desired Traffic Pattern
and then the desired Subnet.
The Navigation Tree in the Menu Panel shows Subnets of the selected Traffic Pattern, while Main
Panel shows traffic for for the selected Subnet (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Host tab will give you top hosts for the selected Subnet).
Figure above shows distribution of Facebook Traffic for the US colleges by host. You can see that
X.X.205.155 host was the major Facebook bandwidth consumer and that the most of the
downloads (In traffic) occurred between 9 and 10 AM.
Info
1. Subnet will be listed under a Traffic Pattern only if its IP address range is a
subset of the included IP address range in the Traffic Pattern Internal Network.
2. Keep in mind that subnet traffic depends on the parent Traffic Pattern. Same
subnet will have different traffic in different Traffic Patterns it belongs to since
the traffic matched to each Traffic Pattern is different.
Level of expertise fast setup and easy to complex setup and harder
understand to understand
Exporter Traffic when you are interested in monitoring the bandwidth of an interface or
exporter (whole traffic passing through the physical infrastructure)
Traffic Patterns to isolate a specific type of traffic (traffic via specific ports, protocols, AS
etc.): YouTube Traffic, certain service traffic, blocked traffic etc.
Traffic Patterns with Subnet Sets to monitor whole or specific traffic per logical unit:
company departments, regional company offices, member organisations, data centre
traffic etc.
By default, NetVizura provides All Traffic Pattern with predefined IPv4 address ranges (10.0.0.0/8,
172.16.0.0/12 and 192.168.0.0/16). However, if your company uses different IP address range
than predefined you need to change All Traffic Pattern. Since this is practically the traffic between
your network and everything else you should select Custom type and update Internal IP addresses
leaving External empty. In the end, you should use Exporter or Next Hop filtering to remove
eventual duplicate flows, if needed.
If you are interested in monitoring Internet traffic, first you need to prepare a specific Traffic Pattern
for this purpose. Since this is practically the traffic between your network and external world where
External network is negation of Internal Network) you should select Normal type which will
automatically populate part of the IP address ranges. Here your company's IP address range is
treated as Internal, whereas all other networks as External. In the end, you should use Exporter or
Next Hop filtering to remove eventual duplicate flows, if needed.
Another example of most commonly used Traffic Pattern is Data Center Traffic.This traffic occurs
between all your company and your data center, you should include you company's IP address
range and exclude your data center's IP range in Internal Network, and include you data center's
IP range in External network (here your data center is treated as "Outside" network). Since Internal
Network (company network without Data center) and External Network (Data Center) IP ranges
overlap you should use Custom type (turns off automatic IP address range population). Do not
forget Exporter or Next Hop filtering to remove duplicate flows, if needed.
To show a Traffic Pattern for the specific Subnet Set, go to TopN > Subnet Sets option and select
the Traffic Pattern node of your interest.
The Navigation Tree in the Menu Panel shows Traffic Patterns and their Subnet Sets, while Main
Panel shows traffic data for for the selected Traffic Pattern (throughput or volume, in bits, packets
or flows), its Subnet Sets or Subnets of those Subnet Sets. Clicking on any tab option will show
traffic distribution by that category (e.g. clicking on the Subnets tab will give you top Subnet Sets
for the selected Traffic Pattern).
Figure above shows All Traffic. You can see traffic for AlphaCom and InoTech Subnet Sets (an
example of two organizations).
Info
Note that Subnets that do not belong to any Subnet Set will not show as child nodes of
their respectful Traffic Pattern in Subnet Set view. Their contribution to traffic will be
added to others category, since this view focuses on Subnet Sets instead of subnets.
To show traffic for a Subnet Set, go to TopN > Subnet Sets option, select the wanted Traffic
Pattern and then the desired Subnet Set.
The Navigation Tree in the Menu Panel shows Subnet Sets (with their belonging Subnet Sets and
Subnets), while Main Panel shows traffic data for for the selected Subnet Set (throughput or
volume, in bits, packets or flows). Clicking on any tab option will show traffic distribution by that
category (e.g. clicking on the Subnets tab will give you lower-level top Subnet Sets of the selected
Subnet Set).
Figure above shows traffic for the AlphaCom. Traffic distributions shows traffic for the US, MENA
and Europe Subnet Sets that were previously defined.
Info
Keep in mind that Subnet Set traffic depends on the parent Traffic Pattern. Same Subnet
Sets will have different traffic values in different Traffic Patterns since the traffic matched
to each of them is different.
To see traffic for a Subnet, go to TopN > Subnet Sets option, select the desired Traffic Pattern,
Subnet Set and then the desired Subnet.
The Navigation Tree in the Menu Panel shows selected Subnet (and its belonging parent Subnet
Sets and Traffic Pattern), while Main Panel shows traffic for for the selected Subnet (throughput or
volume, in bits, packets or flows). Clicking on any tab option will show traffic distribution by that
category (e.g. clicking on the Host tab will give you top hosts for the selected Subnet).
Screenshot above shows New York office traffic that belongs to US offices and AlphaCom Subnet
Sets and All Traffic Pattern. You can see that X.X.1.41, X.X.4.25 and X.X.4.45 hosts were the
major bandwidth consumers of the New York office, i.e. that most of the traffic in the New York US
office of AlphaCom involved these three hosts.
Info
1. Subnet will be listed under a Traffic Pattern only if its IP address range is a
subset of the included IP address range in the Traffic Pattern Internal Network.
2. Keep in mind that Subnet traffic depends on the parent Traffic Pattern and
Subnet Set. Same Subnet will have different traffic values in different Traffic
Patterns and Subnet Sets it belongs to since the traffic matched to each of them
is different.
Let us say that you have two networks with different IP address ranges (10.10.0.0 and
172.16.0.0), each with separate data and voice segments. All these segments are separate
Subnets. The Traffic Pattern and Subnets view will give you total traffic, traffic on each network,
and traffic on each segment. However, Traffic Patterns and Subnets cannot give total voice or total
data traffic (made by both networks combined). For that purpose, it is necessarily to create two
Subnet Sets, one with both voice Subnets, and the other with both data Subnets. Subnet Set
option will show these traffics.
In the other example, IT department might consist of employees working on computers in different
Subnets because they are in different buildings, towns or even countries. This usually means you
can not cover all of them by a single IP address range. With Subnets Sets, you simply group all
individual IT subnets into IT Subnet Set and traffic for the IT department will be available.
This way there is no need to search and navigate every time in order to view desired traffic.
To add a favorite:
1. Go to Favorites tab
2. Right click on a desired favorite
3. Select Remove from favorites
Traffic Statistics can be exported to a PDF file in a form of report that can be printed and presented
to third parties.
To generate traffic statistics report, click Report > Export in the upper right corner of the Main
Panel while in Top N mode.
Figure above shows an example of a PDF report generated by NetFlow Analyzer. This report was
generated by clicking Report while node Internet Traffic (Traffic Pattern) and tab option Host was
selected.
1. Name - that will be used in the further report management in the Settings
2. To - third party recipients which will receive emails ( Recipient does not have to be
included as NetVizura user, practically meaning that any email address can be used)
3. Frequency - period when email will be delivered ( Email will be delivered on the 1st
day of each period. For weekly reports, 1st day of the week depends the server local time
configuration).
4. Message - text that will show in the body of the email.
Existing reports are further managed in >Settings > NetFlow Settings > Reports where
scheduled reports can be edited, removed or cloned.
To clone a report, select copy icon ( ), and follow modification steps similar to report editing.
This article uses filtering based on netflow parameters. For more information on how to On this page:
add a specific filter, see chapter Traffic Pattern Settings and article Fine-tuning a Traffic
Pattern.
Discarded Traffic
Pattern
Internet HTTP
Traffic Pattern
Discarded Traffic Pattern Email
Traffic Pattern
Discarded Traffic is the traffic that your network devices send to the Null interface. On Cisco Facebook Traffic
routers, traffic is sent to the null interface if you have invalid routing (routing tables are not Pattern
complete) or the traffic is blocked by access lists. So, this traffic can give you information on (1) Unexpected
routing problems and (2) on blocked traffic, which is potentially an attack or an attempt of Protocols Traffic
unauthorized access to your network. Pattern
Let us see how to make a Traffic Pattern for this purpose. You are only interested in the traffic
within your network, so you should create a Self-Traffic type. This being said, you should only set
the Internal Network IP address range to your company network's whereas your company
network's range will be automatically included in the External network IP address range
(Self-Traffic). As for using filters, since you are interested in the discarded traffic (null interfaces),
you need to use the Exporter filter. Furthermore, as you are interested in discarded traffic on all
exporters, you need to include all exporters into the filter while setting the Out interface field to 0
(code for the null value).
It is necessary to repeat this step for each exporters that are sending netflow data to
your NetFlow Analyzer.
In some cases, you might want to take a detailed look at HTTP traffic. Since this traffic is between
an outside network and your internal network, you should use the Normal Traffic Pattern type. You
need cover the traffic between your whole internal network and any other network (Internet). This
being said, you should set the Internal Network IP address range to your company network's range
- the External network IP address range will be populated automatically (Normal Traffic). As for
using the filters, since you are dealing with a web service which is recognized by its port(s), you
need to use an Service filter and enter its Service number, HTTP (80) in this example.
It is necessary to repeat this step for each port that is used for HTTP (eg. 8080,
443, etc.).
Your can use NetFlow Analyzer for dedicated monitoring of your Email traffic. You should use the
Custom Traffic Pattern type, since IP address ranges overlap. You need to cover the traffic
between your whole internal network with mail servers. This being said, you should set the Internal
Network IP address range to your company network's range, with exception of your mail server's
IP, and set the External network IP address range as your mail server's IP (in this case your email
server is treated as "Outside" network). As for using the filters, since you are interested in service
which is recognized by its port(s), you need to use an Service filter and add Service number for the
service, Email POP3 port (110) in this example.
Other examples of the filtering based on service are SMTP, SSH, MS-SQL Traffic, etc.
You may want to measure the traffic between your network (or its part) and a specific web service
such as Facebook. Since this traffic is between an outside network (Facebook) and your internal
network, you should use the Normal Traffic Pattern type. You need to cover traffic between your
whole internal network and any other network. This being said, you should set the Internal Network
IP address range to your company network's range - the External network IP address range will be You can also join all major
populated automatically (Normal Traffic). As for using the filters, since you are interested in a web social network traffics in
service which is recognized by its AS, you need to use an AS filter and enter AS number for the into one Social Network
service, in this example the ASN is Facebook's ASN (32934). Traffic Pattern.
1. Select Normal (default Traffic Pattern type)
2. IP Address ranges:
1. Internal: include your company network's range
2. External: your company network's range is excluded automatically
3. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication
2. AS
1. 1. Include Source port(s): 32934 / Destination: empty (All)
2. Include Source: empty (All) / Destination: 32934
Other examples of AS filtering are YouTube, Twitter and Skype Traffic Patterns. You can also
monitor these services in a same Traffic Pattern.
It is necessary that your exporters have BGP table included, and that they are configured
to export AS numbers.
Some traffic important to you might be small in the terms of volume and, therefore, not easily
spotted on charts and graphs, if so - create a separate Traffic Pattern for that traffic. One example
of this is when you are interested in traffic made by protocols other then UDP and TCP. Since
these two protocols usually take up to 99% of all traffic, it will be hard to spot any other protocol on
graphs. Protocols other then TCP and UDP (we will call them unexpected protocols) might indicate
a tunneling protocol or a potential attack.
Let us see how to make a Traffic Pattern for this purpose. You need to cover the traffic between
your whole internal network and any other network - attacks are usually expected to come from the
External Network to Internal Network (your internal network), but keep in mind that your own
network security can be compromised and an attack might be launched from your network to some
other network (both Internal and External network). You will do that by choosing Custom for the
Traffic Pattern type. This being said, you should set the Internal network IP address range to your
company's network range and leave the External network IP address range empty, since you want
to cover all other networks. As for using the filters, since you are interested in protocols, you need
to use the Protocol filter and enter service port numbers for TCP and UDP which are 6 and 17.
Other examples of Protocol filtering are dedicated ICMP, IPv6 and GRE Traffic Patterns.
In order to view End User Traffic, you first need to configure NetVizura to collect syslog
logon messages and map users to IP addresses. After that, end users will automatically
appear in the node tree as they logon to their workstations and start making traffic. To
learn more go to Setting End User Traffic.
End User Traffic is visible only to Admin users with Write permission on the NetFlow
module.
When you investigate atypical behavior or a threat in the network, information about IP address
often does not provide precise identification of the responsible person. Linking an address to a
username is very important because it allows administrators to determine exactly who used the IP
address at the specific time. This significantly improves situational awareness and reduces incident
response/resolution time - help desk agent can quickly call the responsible person to ask if he/she
logged on to the device, and cross-check suspicious behavior.
Traffic for one user is presented as the sum of the traffic from all IP addresses he used during a
certain time window.
To see this view, go to Top N > End Users option and select All Users node.
You can notice that user "Administrator" had significantly higher traffic then other users between
2pm and 3pm. Clicking on user "Administrator" will open single user's view, where you can deeply
inspect his/hers traffic.
To see this view, go to Top N > End Users option and select certain domain within All Users node
.
Traffic for one user is presented as the sum of the traffic from all IP addresses he used
during the certain time window.
1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired domain and username from the Node Tree
3. Choose Host from the Tab panel
In the screenshot above, we see that Administrator logged on to the network at 11:30 and had a
huge download from X.X.13.230. at 12:15.
Each host IP address is resolved to corresponding hostname over DNS, and for each non-private
IP address Whois lookup is perfomed. Data can be viewed in a tooltip, displayed when hovering
over specific host. Whois data contains information about the organization which owns the IP
subnet the host is part of, as well as the AS number, additional descriptions, country and other
location related information for that host.
1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose Conversation from the Tab panel
In the screenshot above you can see that the selected user mostly use mail service, since POP3
protocol consumes most of the traffic.
1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired domain and username from the Node Tree
3. Choose Service from the Tab panel
In the screenshot above, we see that during the selected time window one user made traffic with
some undesirable services - 1.1 GB with Tuxanci game and 440 MB with Vuze BitTorrent.
1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired username from the Node Tree
3. Choose Protocol from the Tab panel
In the screenshot above, we see that this user was logged on to the network from 09:00 till 17:00,
but also from 23:30 till 00:30. He mostly made TCP downloads but also made one larger UDP
download at 11:30.
1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose QoS from the Tab panel
As shown in the image above, traffic that belongs to this user is classified with different QoS
markers and therefore being differently treated while routed through the network. Traffic marked
with EF(46) marker is highly prioritized over other classes of traffic shown in this image, and has
guaranteed bandwidth, which is very suitable for services that require low latency, low packet loss
and negligible jitter. It is noticeable in the example image that the sudden increase of high priority
traffic affected the overall throughput of other classes of traffic causing higher latency and packet
drops for traffic with low priority markers.
1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose AS from the Tab panel
In the image above, you can see that this user has notable amount of Facebook traffic in download
direction, consuming large portion of available bandwidth between 12:03 p.m. and 12:15 p.m. as
well as YouTube traffic in upload direction around 13:02 p.m.
Raw Data Tree groups Raw Data files in folders according to day/hour/minute. Selecting a node
from the tree allows inspection of specific Raw Data files.
Raw Data table shows flow records from the selected Raw Data file(s). Data can be filtered,
grouped and sorted the by almost any field (source IP address, Bytes, Protocol etc.).
Clicking on Names button provides IP address resolution. If you move your mouse cursor over
specific IP address you can see WhoIs information about that host.
In order to enable IP
address resolution, your
NetVizura server should
have local or remote comm
unication with DNS server
(for Hostname) and Internet
access (for Whois
information).
To export Raw Data, click on the the Export button in the upper right corner of the Raw Data
Table.
Depending on your browser settings, browser may ask you were to save the file or it will
save the file to a default folder (usually Downloads folder). Some spreadsheet software
may ask you which separator to use when opening the file - select Comma.
Alarms that occurred during Time Window specified are visible as indicators in the Flow Module
within the Top talker table. For example, we can see below alarms for Facebook Traffic by hosts.
Alarms that have an arrow to the right are active alarms (trigger condition is still active). Only alarm
of the highest severity will be showed. The number in the Alarm table indicates how many alarms
occurred for that table entry during the Time Window.
You are also able to filter, sort, group alarms by source and view only active alarms according to
your need.
UDP Packets show number of received and discarded packets. Viewing packet collection is useful
for checking if your NetFlow Analyzer experienced some packet losses.
It is up to you to decide
much buffer memory to
reserve in order to collect
as much data as possible
during overflows.
Discarded UDP packets mean that your buffer is full - some of the packets sent by
exporters are not collected and will not be included as traffic information.
Flows Processed
Unlicensed flows (dark red on the graph) mean that your network devices are exporting
more flows than your license allows.These flows will not be processed by aggregator
and, therefore, information provided by them will not be included when creating and
displaying traffic. In this case, you should upgrade your license. Read more about Upgra
ding License.
Performance Metrics
Within Performance overview you can see various metrics that show how efficient is your
application.
Counters number - number of traffic monitoring counters (AS traffic, Service traffic etc.) If you have insufficient
memory on the server
Nodes number - number of traffic monitoring nodes (exporters, interfaces, subnets,
remember to consult with
Traffic Patterns and Subnet Sets
our post-installation guide
DB write time - time spent on writing counters to the database
on how to assign RAM to
DB aggregation time - time spent on compacting the database (creating grains)
NetFlow services (Tomcat
Alarm check time - time spent checking and triggering alarms and PostgreSQL).
Heap memory use - memory use after traffic is written to the database
Keep an eye on the Heap memory and how it is affected by the increase in monitored
nodes and counters (each time you add a node or create a TopN rule this numbers are
modified).
To view activity log, click on Show log arrow in the bottom right corner of the application.
One log includes information such as level, time, message and description.
1. Show Options
2. EventLog Chart Show Options
3. Severity Table Syslog Chart
4. Exporter Table Severity Table
5. EventLog Table Exporter Table
Syslog Table
Table and charts will show logs that have (1) the same severity as set in Severity Table (2) for the
time set in Time Window. For these logs Exporter table will show distribution by exporters and
Severity Table will show distribution by log's severity.
For example, on the screenshot to the left, you can see that logs that occurred during the selected
Time Window and severity 0 to 5 are shown. You can also see that there was 523,918 such logs
(Severity Table) of which most numerous were Warnings (55%) and Errors (29%).
You can also see the distribution of these logs by exporters in the Exporter table: exporter
x.x.6.201 generated the most logs (139,130).
Show Options
Show Options:
Syslog Chart
Chart has two axis: numerical y-axis and time x-axis. Numerical axis shows the number of logs per
bar. Time shown on the x-axis of the chart is the same time as set in the Time Window. Next to the
Syslog Chart is the Severity Table in which you can select if syslog messages of the certain
severity will be displayed on the chart or not. Colors on the chart correspond with the colors of the
syslog Severity in the Severity Table.
On the EventLog Chart above you can see that one bar on the chart represents logs during 30
seconds (bar = 30 seconds).
Severity Table
Exporter Table
Syslog Table
EventLog Table shows messages with selected severity (in Severity Table) that were received
during time set in the Time Window. For each message Date, Exporter, Severity, Facility and
Message content is displayed. Severity levels are shown with the corresponding color, as in the
chart and Severity Table. 9/19 Figure 7: Exporter Table Figure 6: Severity Table Syslog Table can
be filtered by Exporter, Severity, Facility and Message content. Note that the filters can be
activated by selecting items in the Severity and Exporter Tables, as described above. To clear all
filters, click the Clear button above the Syslog chart. To show exporter DNS names, click the Show
Names button above the Syslog chart.
table filters
Quick filters are activated/deactivated by clicking on the corresponding severity in the Severity
Table, or clicking on the corresponding exporter in the Exporter table. Inactive severity/exporters
are marked with gray color, while active severity/exporters are colored. Logs from inactive
exporters and logs with inactive severity levels are not shown in the charts and tables, and are not
counted in the on-screen statistics.
update Syslog Table filters for the corresponding exporter or severity level
Note: Filters and data in Syslog Table, Exporter Table, Severity table always match each other.
Figure 10: Using filters in Syslog Table shows Syslog Table and Severity Table, and you can see
that the Severity filter in the table matches the active (colored) severity levels in the Severity Table.
Table filters are used to filter syslog messages by log's severity, exporter, facility and message text
body. To activate or change a filter simple type the value in the corresponding filter text field and
press Enter. This will update the data on all chats and tables.
To filter out the logs based on the time and date, change the Time Window value by clicking on it
and (1) choosing a value from the drop menu or (2) selecting from and to dates in the calendar.
Updating the Time Window will update the data on all chats and tables.
Data shown:
Date
Exporter
Trap OID
Trap details Trap details column contains
Alarms information about variable
bindings for each trap message.
You can resolve OID and exporter IP
names by clicking on the "Show names"
button above Trap table, as shown in the
screenshot below. Exporter names are
Hovering over any OID in Trap
resolved via DNS, and OID names are
OID and Trap Details columns will
resolved by extracting data from the MIB
display that OID's description in a
modules.
tool-tip.
If OIDs are not resolved, add the corresponding MIB module for that OID in > Settings > MIB
Settings > Modules.
System tab shows NetVizura EventLog system traffic. Tab is organized in two sections: Syslog and
SNMP Trap. Each section has a chart and a corresponding table as shown on the Figure 11:
System tab - Syslog messages.
Syslog messages:
Logs sent to NetVizura server are put in the buffer before processing. Logs are taken from the
buffer and matched against the license and Syslog filters. If the the number syslog exporters
exceeds the license limit - the log's message will be obfuscated (Unlicensed logs). If a filter marks
a log to be reject it will be not be stored or processed (filtered logs). If the buffer is full (to many
logs are being sent), incoming packets will not be stored or processed (Dropped logs). Logs that
are not dropped, obfuscated or filtered are counted as Processed log.
To manage your Syslog filters, go to > Settings > EventLog Settings > Syslog filtering. To
learn more about Syslog filters, go to
Traps sent to NetVizura server are forwarded to SNMP4J library. Traps are matched against the
license and SNMP Trap filters. If the the number trap exporters exceeds the license limit - the
trap's message will be obfuscated (Unlicensed traps). If a filter marks a trap to be reject it will be
not be stored or processed (Filtered traps). Traps that are not obfuscated or filtered are counted as
Processed traps.
To manage your SNMP Trap filters, go to > Settings > EventLog Settings > SNMP Trap
filtering.
Here you can see the list off all alarms that occurred within the selected time period. In our case,
we can see Auth. warning alarm that we previously defined in Settings.
Occurrence indicators visualize approximate time (withing selected time window) when
alarm occurred.
You are also able to filter, sort alarms and view only active alarms according to your need.
Error rendering macro 'excerpt-include' : No link could be created for 'Configuring EventLog
Alarms'.
Click on the device name or IP address in the Exporter Table or type the device's IP address in the
Exporter filter in the Syslog Table (text field under the Exporter column).
Type the IP addresses of the specific devices in the Exporter filter in the Syslog Table (text field
under the Exporter column) separated by comma.
Click on the Total in the Exporter Table or clear the Exporter filter in the Syslog Table (text field
under the Exporter column).
Click on the wanted severity level in the Severity Table to make it active (colored), click on the
unwanted active severity levels to switch them off (they will turn gray); or, type the severity number
in the Severity filter in the Syslog Table (text field under the Severity column). Multiple severity
numbers must be separated by comma.
Clear the Severity filter in the Syslog Table (text field under the Severity column); or, click on the
inactive severity levels (gray) in the Severity table to make them active.
Go to > Settings > EventLog Settings > Configuration and under Service options set the
Maximum Severity Level Shown parameter. For example, if the parameter is set to 3, shown
severity levels will be 0, 1, 2, and 3.
Type the facility number or name in the Facility filter in the Syslog Table (text field under the
Facility column).
See logs that contain specific text in the message text body
Type the specific text in the Message filter in the Syslog Table (text field under the Messages
column).
Go to > Settings > EventLog Settings > Syslog filtering and make your filter. To learn more on
making filters, go to chapter Error: Reference source not found Error: Reference source not found
on page Error: Reference source not found.
Go to > Settings > EventLog Settings > Configuration and under Service options set the
Syslog socket port parameter.
Go to > Settings > EventLog Settings > Configuration and set the database maintenance.
Searching OIDs
Setting Current Device
Making SNMP Request
Managing MIB Favorites
Reading MIB Details
The search results will be shown in the Search tab. Name, (MIB) Module and OID number are
shown for each OID found. Clicking on an OID in the Search tab will select it in the MIB tree.
Result will display in the main panel (3) in a new tab. Title of the tab will be the OID name and it will
contain the device to which the SNMP request was sent to (the Current device).
On the screenshot we can see that SNMP query was sent to device cisco3550-xx (3) for the
ifTable.
If there is no Current device set, the application will prompt you to enter an instant
device. You can request the SNMP query from MIB tree or Favorites.
Table Request
An example of SNMP query result table is shown on figure below. SNMP table contains name and
value for each OID corresponding with the same index. SNMP table has the fallowing information
and options:
List requests
The list will show up to 50 rows by default. If the list has more rows, the Next option will be
displayed. Click next to get next 50 rows. To change the maximum
number of rows displayed,
Refresh option will show if there is less than 50 rows, or you reached the last page of the list (after go to > Settings > MIB
clicking Next). Click Refresh to send the SNMP request again. Settings > Configuration
and change the List
response limit parameter.
You can set an OID value if it is marked in blue in the table returned by the SNMP request. To set
the OID value:
To set an OID value and SNMP SET change to be successfull on a device, you need to
have:
Result will display in the main panel in a new tab. Title of the tab will be the OID name and it will
contain the device to which the SNMP request was sent to (the Current device).
If there is no Current device set, the application will prompt you to enter an instant
device.
An example of Favorites
are shown on the
screenshot. The
Favorites shown are the
result of adding IfTable
to favorites.
Adding OID to
Favorites
To add an OID to
Favorites right-click on it
in the MIB Tree and
select Add to Favorites.
Adding a Favorite will add that OID to your Favorites list only, it will not affect the
Favorites list of other users.
To remove an OID from Favorites right-click on it in the Favorites Tree and select Remove from
Favorites.
When you remove an OID from Favorites you remove entire branch of MIB tree that starts with that
OID. For example, on screenshot above removing ifTable from Favorites also removes ifEntry, and
its belonging nodes ifIndex, ifDescr, etc.
Removing a Favorite will remove that OID from your Favorites list only, it will not affect
the Favorites list of other users.
On the figure below we can see the details for ifTable: Name, OID number, Status, Access, Value
Type and Description.
General Settings
NetFlow Settings
EventLog Settings
MIB Settings
User Settings
SNMP Policy Settings
Device Settings
License Settings
E-Mail Settings
Display Name Settings
Time Window Settings
To manage users accounts, go to > Settings > Control Panel > Users.
Permissions for specific application features depend on the selected user type:
Module permissions are used to choose user’s privilege level for a specific module.
Read - user can also schedule Reports and view Report Settings
Write - user can also view Raw Data, edit Report Settings, view End Users and edit End
User Settings
1. Click +Add
2. Insert user's Login and Contact Information into appropriate fields
Info
First name, Last name, Username and Password are mandatory fields.
Email is needed for receiving emails (alarms and system emails).
Administrators (user type admin) will receive system critical alarms and
warnings via email.
To remove a user:
Policy for a certain device in NetVizura has to match that actual SNMP configuration of
that device in order for to get SNMP reports for particular MIB or OID for that device.
To access Policies, go to > Settings > Control Panel > SNMP Policies.
On the screenshot to the left we can see Policy table together with some policy examples. As you
can see, table shows basic policy parameters:
1. Name
2. Port
3. SNMP version
4. v3 security level
Looking at the first policy “x comunity” we can see that the port used for SNMP is 161, and that
SNMP version is v2c. Naturally, since it is v2c there are no associated v3 security levels.
To Add a new policy, click the + Add button at the top of the Policy table.
To edit a policy, click on the pen (edit icon) or double click on the policy table row.
SNMPv3 security level options are only visible if SNMP version is set to SNMPv3.
When an SNMP request is sent to a device associated with a protocol the request will be sent to
the policy UDP port using the policy username as SNMP community and version. In order for
request to be successful the policy has to match the SNMP configuration of the target device.
Successful request will result in a number of packets each containing a number of OIDs set by the
Repeaters parameter (this is a number of SNMP request repeats in one SNMP Query). If the
request is unsuccessful, there will be a number of retries (Retries parameter) with a certain timeout
between each request based on the Timeout parameter (timeout incrementally grows after each
request).
In the example shown in the screenshot above the SNMP request in view mode will result in a
SNMPv3 request to a device on UDP port 161 with the above set security parameters. If the device
doesn't reply, there will be one more retry after 1000ms.
Screenshot above shows the Device table. As you can see, table shows a list of devices with their
basic parameters:
1. Name
2. IP address
3. Port
4. SNMP Policy
5. SNMP version
Looking at the first device “cisco2950-xx” you can see that the its IP address is x.x.3.84 and that
the policy used on the device is “public”. Furthermore, you can see that the said policy is SNMP
v2c and that the UDP port used for SNMP is 161.
Devices are automatically added when device discovery is made in NMS and NetFlow
module. It is not possible to manually add a new device.
Read more about Device Discovery and Working with Exporters and Interfaces.
On the screenshot "Editing device" above you can see device parameters: name, IP address and
policy. Name is used to identify the device in the application, and IP to identify the device in the
network.
1. Click on pen (edit icon), or double click on the Device table row
2. Set name or policy
3. Click Save
Choosing a policy:
If you know the SNMP configuration of the device and the corresponding policy, you can
choose the policy from the Policy drop-down list.
If you do not know the SNMP configuration of the device and the corresponding policy,
click on the Detect and the application will try each policy defined in the application on the
device specified. If successful, the Policy field will be automatically updated.
Additionally, you can test if the set device works by clicking on the Test button.
License type
Application version
Expiration and support end date
Installation code
Installation code is needed for generating commercial license key. You can send it by clicking the
Send button (opens email client).
1. In a field SMTP Server type fully qualified domain name (FQDN) of your SMTP server
2. In a field From address type sender mail address
3. Include password only if it is required by your SMTP (outgoing) mail server. If not, leave If you have multiple
blank SMTP Password field. installations of NetVizura it
is wise for mail sender
address to correspond to
the server's name: NVtest
@domain.com or NV-produ
[email protected].
Configuring AS
NetFlow Analyzer has a searchable built-in register of AS names and numbers. AS register is
taken from IANA.org. AS numbers (ASN) are not changeable, but new autonomous systems can
be added. In the unlikely event of NetFlow Analyzer built-in register not having the ASN you are
looking for, you can retrieve it by visiting IANA.org. You can change AS name and description.
To configure AS, go to > Settings > Miscellaneous > Display Names > AS.
NetFlow Analyzer has a searchable built-in register of Service names and numbers. You can
change Service name and description. Service numbers are not changeable, but new services can
be added.
To configure Service, go to > Settings > Miscellaneous > Display Names > Service.
Configuring Protocol
NetFlow Analyzer has a searchable built-in register of Protocol names and numbers. You can
change Protocol name and description. Protocol numbers are not changeable, but new services
can be added.
To configure Protocol, go to > Settings > Miscellaneous > Display Names > Protocol.
Default Time Window - time period that will be selected each time you log-in to
application.
Date preference - format in which date ranges will be presented
To configure Time Window, go to > Settings > Miscellaneous > Time Window.
Traffic Patterns allow you custom monitoring of any specific traffic type you want, independently of
your physical infrastructure. For example:
It usually takes 10 minutes for NetFlow Analyzer to aggregate and show the statistics for
the new Traffic Pattern.
In case Exporter filter is used in the Traffic Pattern definition and the Exporter IP address
changes, you will have to manually update it in the Traffic Pattern definition.
Who is talking to whom? In which networks or subnets are the end points?
Are both sides of the conversation in your network (Self-Traffic), is one outside of your
network (Normal), can one side of the conversation be both in your network and outside of
it (Custom)? (This will help you to choose the Traffic Pattern type.)
Where are these networks located – inside or outside of your company network? (This will
help you define the Internal and External Network.)
Is there something very specific about the traffic in question, such as the destination AS,
used service port or protocol or some specific QoS marker? (This will help you choose the
necessary filter.)
After this you should have a clear understanding of how to build your Traffic Pattern: Internal and
External IP address ranges, and additional filtering by exporter, interface, service port, QoS,
protocol etc.
Screenshot below shows the Address tab which is used for setting the IP address ranges:
In this screenshot you can see a Traffic Pattern were Internal network consist of 4 subnets and
External network with no subnets defined (effectively this is any subnet). This Traffic Pattern will
monitor traffic between these four subnets and any other network, including internal traffic (traffic
between IPs that belong to any four subnets in the Internal Network).
To help you in Traffic Pattern creation, NetFlow Analyzer offers three types of Traffic depending on
the direction of traffic in regards to you Internal network. These three types will also help you
create Traffic Patterns more quickly because they will include or exclude some address ranges
form the Internal or External Network automatically. These Traffic types are:
Normal Traffic
Self Traffic
Custom Traffic
Self Traffic
If you wish to monitor traffic that originates from and ends in your network or its part (your network
is both the source and the destination of the traffic), then you choose the Self Traffic,
assuming that you previously correctly configured all subnets that exist in your network. If, for
example, you wish to monitor the traffic that originates from the 10.0.0.0/8 network (which can be
divided in multiple subnets) and ends up in the same network, we simply enter 10.0.0.0/8 in
the Internal address ranges field and click on the Include command. The same address will be
automatically entered in the include section of the External address ranges field on the right-hand
side of the panel. Defined in this way, the Traffic pattern will collect information on all traffic that
originates from the 10.0.0.0/8 network and ends up within the 10.0.0.0/8 network. If we wish to
monitor only a specific service or protocol, it is possible to add additional filters as mentioned
earlier.
Normal Traffic
A Normal Traffic is used when we wish to monitor traffic which originates from an internal network
and ends up in an external network, such as the Internet. If, for example, we wish to monitor the
traffic that originates within the 10.0.0.0/8 network and ends up outside of that network we
enter 10.0.0.0/8 in the Local Address Range field and click on the Include command. On the
right-hand side of the panel, in the External Address Range field, the same 10.0.0.0/8 network will
be automatically entered in the excluded section. This Traffic Pattern will monitor all the traffic
originating within the 10.0.0.0/8 address range and ending up outside that address range.
Additional filters can be set up to further filter out the traffic.
Custom Traffic
A Custom Traffic is used when you wish to monitor traffic which is a combination of two previous
cases. In the case of such Traffic Pattern, there is no correlation between Internal and
External address ranges fields.
Also, it is possible to set up additional filters using the include and/or exclude commands. Filtering Based
Additional filters are based on: on Exporter
and its
Exporter and its interfaces Interfaces
Filtering Based
Service on Service
Filtering Based
AS on AS
Filtering Based
Protocol
on Protocol
Filtering Based
QoS
on QoS
Filtering Based
Next Hop
on Next Hop
These filters can be freely combined to make very specific Traffic Patterns which are matching
the traffic you are interested in. For instance, by combining first three filters, you can monitor the Related pages:
traffic from a single network device that uses a specific service in communication with a specific
Autonomous System. Setting IP
Address
Ranges
Bare in mind that this filters are for fine-tuning your Traffic Patterns. In particular, this
means that the filter is applied only to the traffic matched by a given Traffic Pattern IP
address range. In other words, an IP address from the Traffic Pattern definition is applied
first, and then the filters are applied.
Therefore, if you want to monitor all traffic that goes from your internal network via
certain exporter/service/AS/protocol/QoS, you need to apply that filter to a Traffic Pattern
that covers all traffic (such as All traffic Traffic Pattern). Likewise, if you want to monitor
the traffic from a particular Traffic Pattern via certain exporter/service/AS/protocol/QoS, a
pply that filter to that Traffic Pattern.
You can monitor the traffic that has been exported by a single device (exporter) or that
has entered/exited a specific interface of that particular device (exporter).
The Exporter IP field is used to specify the IP address of the exporting device, while Interface In
and Interface Out fields are used to specify the SNMP ID of one or more interfaces of the device.
Use the Include and Exclude options to include or exclude several interfaces of the exporter from
the filter.
This filter is most commonly used to remove duplicate flows. Read more at Resolving
Duplicated Export.
You can either include one or more exporters, or exclude one or more exporters.
It is not possible to have included and excluded exporters in a single Traffic
Pattern.
Device must be an exporter (actually export netflow data to the NetFlow Server)
in order for filtering to have any effect.
IP address used to identify the exporter is the IP address the router has been
configured to export the netflow data from.
Example 1
We want to monitor all traffic exported by a network device with the IP address
10.1.1.1. Furthermore, we are only interested in the traffic that has entered through interfaces with
SMNP IDs 1 or 2 and exited through interface 4.
6. Click Save
This filter translates to “traffic must pass through router 10.1.1.1, entering through
interface 1 or 2, and exiting through interface 4”.
Example 2
We want to monitor all traffic from a single physical link. This link is on a network device with the IP
address 10.1.1.1, interface with SMNP ID 1. This means that interface 1 is both In and
Out interface. The device is an exporter.
Do not set Interface Out field to 1 here. This would make an invalid filter, since
flow can not enter and extit the exporter on the same interface at the same time.
This filter translates to “traffic must pass through router 10.1.1.1, entering through
interface 1, or pass through router 10.1.1.1, entering through interface 1”.
Example 3
To monitor the traffic that entered through the Interface with SNMP ID 1 on any/all exporters:
Exporter table added an entry "Exporter IP: all Interface In: 1". This indicates that
interfaces In with the SNMP ID 1 of all network devices are included in this filter.
Example 4
1. Type in 10.1.1.1 into the Exporter IP field, where 10.1.1.1 is Exporter's IP address
2. Type in 1 into the Interface In field, where 1 is SNMP ID of interface we are not interested
in
3. Leave the Interface Out field empty
4. Select Exclude radio button (default)
5. Click Add
6. Click Save
Exporter table added an entry Exporter IP: 10.1.1.1 Interface In: 1 Interface Out: all and
that Exclude and Include radio buttons are disabled, while the Exclude radio button is
active. This indicates that the only traffic that will be excluded from the Traffic Pattern will
be the traffic entering through the Interface 1 on the network device with the IP address
10.1.1.1.
You can filter traffic based on services by including or excluding one or more service
ports. Filtering is done by inserting service port numbers for the source and destination AS. This
enables you to monitor the traffic utilizing certain service ports or services only.
If you do not know the service you wish to include/exclude, go to > Settings >
Display Names > Service tab and do a search on the desired service port.
Example
We want to monitor all traffic exported by a network device with IP address 10.1.1.1. Furthermore,
we are only interested in the traffic that has entered through interfaces 1 and 2 and exited through
interface 4:
Filtering Based on AS
You can filter traffic based on AS, by including or excluding one or more Autonomous
Systems. Filtering is done by inserting AS numbers (ASN) for the source and destination AS. This
enables you to monitor the traffic between going to or coming from a certain AS or AS group and
the traffic between two AS or AS groups.
You can filter the traffic based on the protocol, by including or excluding one or more
protocols. Filtering is done by inserting protocol numbers into the Protocol Number(s) field. This
If you do not know the Protocol Number of the protocol you wish to include/exclude, go
to > Settings > Display Names > Protocol tab and do a search on the desired
protocol name or locate the protocol in the Protocol table.
You can filter the traffic based on QoS, by including or excluding one or more QoS markers.
Filtering is done by inserting the ToS field into the ToS list field. This enables you to only monitor
the traffic including or excluding a certain level(s) of QoS, or in other words including or excluding
certain ToS fields.
If you do not know the exact ToS for the QoS level you want to monitor, go to > Sett
ings > Display Names > DSCP tab and locate the desired DSCP number in the table.
You can filter the traffic based on next hop, by including or excluding one or more next hop IP
addresses. Filtering is done by inserting the IP address for next hop field into the Next Hop IP field.
This enables you to monitor only traffic including or excluding a certain next hop.
If you have a central exporter (a netflow exporter through which all desired traffic is passing
through) then preventing duplicated Traffic Pattern traffic is easy. You just need to add a filter to
the Traffic Pattern in the Exporter section of the Traffic Pattern definition. Add the IP address of the
central exporter while include option is set. This will result in Traffic Pattern matching only netflow
that was exporter by the central exporter.
In our example above, flow that passes and is exported by three routers (R1, R2 and R3) will be
taken into account and processed only from central router (R2) since Traffic Pattern includes its IP
address in Exporter filter.
Have in mind that all other traffic (passing via central exporter) will not be captured.
If you do not have a central exporter and/or your network topology is more complex you can
prevent duplicated Traffic Patterns by entering exporters and their specific interfaces from which
you will either include or exclude traffic when matching traffic to a Traffic Pattern. In this way you
can exclude specific interfaces on exporters that would duplicate the traffic.
Have in mind that all other traffic (via included exporters and interfaces) will be captured.
In the example below, a flow travelling from Host A to Host B passes via two central routers R1
and R2. As a consequence, one flow is exported and processed to a netflow server twice (by R1
and R2). This should be overcome by adding next hop filter.
The solution is to exclude R2 as Next Hop IP address. This will simply skip all the flows passing
from router R1 to R2. Flows will be then matched and processed only by router R2. The same
applies for flows from Host B to Host A - excluding R1 as Next Hop will skip flows from R2 to R1.
Have in mind that all other traffic (not having R2 and R1 as next hop) will be captured.
NetFlow users can view and NetFlow administrator can add, edit or delete Subnets.
To configure subnets, go to > Settings > NetFlow Settings > Subnets tab.
Tip
1. Click Add
2. Type in subnet_name into the Name field (optional)
3. Type in subnet_ip_address_and_mask into the Address field.
4. Click Save.
Note that any new subnet will be automatically added in the subnets hierarchy, and in all Traffic
Patterns if its IP address range belongs to the Internal Network of the Traffic Pattern.
NetFlow users can view and NetFlow administrator can add, edit or delete Subnet Sets.
To configure subnet sets, go to > Settings > NetFlow Settings > Subnet Sets tab.
1. Click Add
2. Type in subnetset_name into the Name field
3. Type in subnetset_description into the Description field (optional)
4. Add subnets from the Available Subnets list to your SubnetSet
Available Subnets list displays all subnets you previously defined that are not
members of any Subnet Set, while the Available Subnet Sets list displays all Subnet Sets
that are already created.
A subnet can be a member of only one Subnet Set.
5. Add Subnet Sets from the Available SubnetSets list to your Subnet Set
6. Click Save.
Note that new Subnet Sets will be automatically displayed under a Traffic Pattern if its IP address
range is included in the Traffic Pattern's Internal Network.
Navigate to Netvizura Eventlog module and choose Syslog tab. Identify syslog message with
logon information. This log should contain:
1. IP address of domain controller that exports Syslogs - type IP address into Exporter text
box and press Enter
2. Windows code 4624 that designates successful logon event - type 4624 into Message filte
r text box and press Enter
3. Select, copy and paste text message in some text editor (Wordpad or similar)
4. Create appropriate Match string in text editor
Match String
1. Find Account Name within the message and put <USERNAME> instead of real account
name (please refer to picture below)
2.
NetFlow users can view and NetFlow administrator can add, edit or delete TopN rules.
To configure TopN rules, go to > Settings > NetFlow Settings > TopN tab.
1. Choose Edit Default rule (click on pen icon button, or double click on table raw)
2. Update the TopN shown fields as wanted
3. Confirm with Save
1. Click Add
2. Give a Rule Name
3. Choose Node for which the rule will apply to
1. Choose Note type (Exporter, Interface, Traffic Pattern, Subnet, Subnet Set, All
Users, End User, Domain)
2. Click Select to choose a node (popup showing all available nodes will show)
4. In TopN shown section change the topN count for a traffic distribution (host, conversation,
service...)
You need to login/logout to be able to view these changes on charts and tables.
To configure NetFlow alarms, go to > Settings > NetFlow Settings > Alarms.
1. Click Add
2. Set Alarm information (name, description, level, scope, object and optionally mail-to
recipients)
Figure above shows an example of an Alarm. This alarms triggers if any host in the network has
more than 6 kbps of Facebook traffic in 5 minutes. Facebook traffic is identified via Facebook
Traffic Pattern. On alarm trigger an email will be sent to Winter Jon and Goldberg Dany.
NetFlow users can view and NetFlow administrator can add, edit, delete or
reorder aggregator filters.
To configure aggregator filtering, go to > Settings > NetFlow Settings > Aggregator
Filtering tab.
Source IP Protocol
Destination IP Exporter IP
Source port Interface in
Destination port Interface out
Note that filters are executed in their order. Default filter is always applied last.
Set default filter to reject all flows and create specific filters that explicitly accept certain
flows
Set default filter to accept all flows and create specific filters that explicitly reject certain
flows
In case Exporter IP is used to create a filter and that netflow exporter changes its export
IP address, you will have to manually updated the filter.
NetFlow users can view and NetFlow administrator can add, edit or delete exporter sampling rules.
To configure sampling rules, go to > Settings > NetFlow Settings > Sampling tab.
Service Options
NetFlow Database Maintenance
Archiving Raw Data
Importing/Exporting Settings
Automatic Deduplication
To access NetFlow system configuration, go to > Settings > NetFlow Settings > Configuration.
NetFlow General
Collection port - port used by the application to receive the netflow data. The value has
to be the same as the value set on your network devices which export the netflow data
(Exporters). Default value is 2055.
Collection port timeout - UDP socket timeout in seconds
End Users
End users collection port - port used by the application to receive the user logon/logoff
syslog messages. The value has to be the same as the value set on your syslog agent.
Default value is 33515.
End users collection port timeout - UDP socket timeout in seconds
NetFlow Analyzer will warn you if your storage space is full and tell you exactly what actions are
advised. Warnings are sent by email to NetVizura administrators and displayed when you log-in.
Warning message is triggered when application concludes that Maximum database size will be
reached without storing minimum amount of traffic in weeks (Minimum database size in weeks).
Example of storage warning message for Maximum database size set to 30 GB and Minimum
database size in weeks set to 52 weeks:
9 weeks of data (5.5 GB) still needs to be stored, but only 5 more weeks' worth of
space (3 GB) remain in the database storage.
You need to provide more space for NetFlow database (currently set to 30 GB),
or lower the minimum number of weeks (currently set to 52 weeks) for which you
would like to keep the data. 52 weeks is approximately 33 GB.
NetFlow database stores the data needed for chart and alarms in NetFlow
module. When the database size increases beyond configured limit, oldest entries
will be deleted although those entries would fall within configured minimum
number of weeks - consequently charts and alarms corresponding to deleted
entries would be missing.
Temp folder - folder in which NetFlow Analyzer will temporary unpack Raw Data files
Archived files folder - folder in which NetFlow Aggregator stores processed files
Legacy raw files folder - folder in which NetFlow stores Raw Data files from previous
versions
Minimum free disc space - minimum free hard disk space is a value that needs to be free
on the NetFLow Server in GB. Once saving of new Raw Data file threatens to lower free
hard disk spaces bellow this value, NetFlow will delete the oldest Raw Data files freeing up
the disk space. Default value is 100 GB.
Minimum archive size in days - the system will warn you up to 7 days before archive
space runs out
NetFlow Analyzer also warns you if your archive space is full and tells you exactly what actions are
advised. Warnings are sent by email to NetVizura administrators and displayed when you log-in.
Warning message is triggered when application concludes that Minimum free disc space will be
reached before minimum amount of Raw Data files in days is stored (Minimum archive size in
days).
Example of archive warning message for Minimum number of days set to 30 and Minimum
disk space set to 2 GB:
10 more days of data (30 GB) still need to be stored, but only 7 more days' worth
of space (21 GB) remains in the archive storage.
You need to provide more space for archive files. You can also move existing
files to another location, or lower the minimum number of days (currently set to
30) for which you would like to keep the archive files. (30) days of archive files is
approximately 90 GB.
NetFlow archive stores Raw Data files. These files can be analyzed in the Raw
Data tab in NetFlow module. When the NetFlow archive is full, oldest Raw Date
files will be deleted, although those Raw Data files would fall within configured
minimum number of days.
Space estimation is based on the average size of your raw data file.
Remaining space for the archive is calculated by deducting Minimum free disk
space from the current available free disk space.
In the above example, if Minimum free disk space is 2GB, the warning message
will trigger when free disk space goes under 23GB.
If you already added Traffic Patterns, Subnets, Subnet Sets, alarms etc. to new version
of NetFlow Analyzer, you will need to remove all entries before proceeding further to
avoid duplication.
1. Go to > Settings > NetFlow Settings > Configuration > Automatic Deduplication
2. Select Enable
Here you can set Syslog filtering, SNMP Trap filtering, and NetVizura EventLog service and
database maintenance options.
Syslog Filters are used to make explicit rules to filter out unwanted syslog messages. Filtered out
messages will not be processed, stored and showed in the EventLog charts and tables. To access
Syslog Filters, go to > Settings > EventLog Settings > Syslog filtering.
By default, there is only one Syslog Filter named Default that accepts all syslog messages. On the
Figure 15: Syslog Filter Table you can see Syslog Filter list together with some filter examples. As
you can see, each filter has:
1. Filter number
2. Description
Looking at the second filter named “Block Fan” you can see that it is used to block (reject) fan
related logs (log message contains the word “fan”) of low priority (severity levels between 3 and 7)
from any device.
Filter table is ordered which means that filters are applied in the order of the table: filter with the
filter number 1 will be applied first, then rest will follow. Note that default filter is always the last one
to be applied.
Ordering and Default filter allows you to have two filter strategies:
Explicit reject: default filter accepts all messages, filters reject specific messages
Explicit accept: default filter rejects all messages, filters accept specific messages
Default filter is always active, always the last to be applied, and the only change you can
make to it is to change its Filter action (to accept or reject all messages).
To Add a new filter, click the Add button at the top of the Filter table.
The conditions are added by clicking on the “+” icon and composite conditions are added by
clicking on the “+()“ icon. Composite conditions will appear in the filter expression in the brackets,
and are generally used if you need a condition in the form of Cond1 AND (Cond2 OR Cond3).
Logical operator between condition are set by the drop-down list next to “+” and “+()” options:
Match All (AND), Match Any (OR), Match None (NAND).
To set EventLog alarms, go to > Settings > EventLog Settings > Alarms.
1. Click Add
2. Set Alarm information (type, name, description and level)
3. Set Alarm threshold
For Syslogs, threshold is based on source IP, severity, facility and message content
For SNMP traps, threshold is based on source IP, OID and variable bindings.
It is possible to combine more threshold criteria (AND logical operand is implied).
If you do not define a value to a certain criterion, that criterion will not be included in the Alarm
condition.
Screenshot above shows an example of an Alarm confguration. This alarms will trigger if syslog
message is sent from 147.91.7.65, with severity level 3 and message containing Authentication
failure.
Service Options
Database
Maintenance
Service Options
To access Service options, go to > Settings > EventLog Settings > Configuration.
In service options you can set listening port for syslog and trap messages, and view preferences.
To set Syslog socket port, change the value in the corresponding text field and click Save. Note
that devices exporting syslog messages need to target this port (explicitly or via redirection).
To set Trap socket port, change the value in the corresponding text field and click Save. Note that
devices exporting trap messages need to target this port (explicitly or via redirection).
By default, syslog messages are exported from the devices to port 514, while NetVizura
listens on the port 33514 in Linux systems and on the port 514 in Windows systems. If
you use Linux systems, you need to (1) redirect syslog messages to the 33514 on
NetVizura server, (2) export syslog messages to 33514 from device, or (3) change
NetVizura EventLog configuration. Same applies to trap socket port.
Maximal severity level shown is by default set to 3 – Error which means that when you open
EventLog module severity levels 0, 1, 2, 3 will be active in the Severity Table. To change the value,
click on the drop down menu and choose a different value.
On screenshot above you can see an example of database maintenance configuration: cleanup is
triggered after every 10,000 messages and the cleanup service will delete messages that are
either more than 120 old, or the oldest messages if the database size is more than 20GB.
To change database maintenance parameters, edit the corresponding text fields and click Save.
Setting the Keep messages in database for parameter to zero will switch off deletion of
the messages in regards to their age. In other words, cleanup service will only delete
messages if the maximum database size is exceeded.
You are able to set MIB modules, SNMP queries and search options.
On the screenshot to the left we can see MIB module table together with default MIBs. As you can
see, table shows basic MIB parameters:
1. Name
2. Release date
3. Imports
Looking at the first MIB named “xxxx” we can see that it was released on 6th of January 1994 and
that its imports mib-2 located in the MIB called RFC1213-MIB. This means that in order for
BGP4-MIB to be added to the database, RFC1213-MIB had to be added before that.
To add a new MIB module, click the + Add button at the top left of the Module table.
When importing, multiple MIB Module files may be chosen for import. All selected files will be
imported successfully in case MIB Modules, you are importing, have not yet been uploaded. If that
is not the case, appropriate dialog will be displayed, and you will be asked to resolve existing MIB
Module conflicts. By default, the module you are trying to import will be selected for import, only if it
is newer revision comparing to the module already in database. On the other hand, if the module
you are trying to import has unknown or older revision comparing to one already in database, you
can resolve import conflict by choosing the revision of the module you want to keep.
Make sure not to select multiple MIB Module files with the same name when
importing modules in bulk. In that case, there is no guarantee which module
will be imported.
If some other MIB Module depends on the module you are trying to remove, application will show a
list of all dependent modules and you will not be able to remove selected module until you remove
all dependent modules. Otherwise, remove action will be successful.
1. Search results
2. List response
limit
3. Table response
limit
Search results sets the limit to the number of results returned using the Search option. When the
number of found OIDs reaches the limit set here, the Search action will stop.
List response limit sets the limit of OID values returned and showed on a page as a result of
SNMP request on a MIB tree element. When the number of found OID values reaches the limit set
here, the SNMP walk will stop and the found OID values will be displayed. This limit is used to
break very large SNMP request into several smaller ones.
For example, if you click Request on the MIB tree element that can return 200 OIDs and the List
response limit is 50, in view mode first 50 results will show. When you click the Next button above
the table, next 50 results will show etc. Effectively, this SNMP request has been broken down into
4 smaller SNMP requests.
Table response limit sets the maximum number of table rows shown on a page as a result of
SNMP request on the MIB tree element that is a table. Result of the request will be shown as a
table with multiple columns and successive rows are displayed by clicking on the Next button
above the table.
For example, if you have a MIB table containing 1000 OIDs organized in the 5 columns, we will
have in total 200 rows. If the Table response limit is set to 50 then the resulting table after a SNMP
request will shows first 50 rows (containing 5 x 50 = 250 OIDs). When you click the Next button
above the table, next 50 rows will show etc. Effectively, a very large table is shown in 4 steps.
This usually happens if RAM is not allocated to NetVizura services: PostgreSQL and Tomcat. After
installation it is needed to tweak the configuration files in order to utilize the installed RAM to the
fullest extent.
Solution
If the memory is already fully allocated, add more memory to the server and re-tweak
PostgreSQL and Tomcat to use the extra memory.
Related articles
Solution
Web interface is started via browser using Tomcat and PostgreSQL service. The interface is
access by typing http://netvizura_server_ip:8080/netvizura.
Note
When trying to login, application displays the following error: "Exception caught: 500 The call failed
on the server". This can happen if the browser window with the application stayed open during
update or if the browser session has expired or if database is not running.
Linux Solution
1. Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.
If this doesn't work, access the server via ssh and execute the following commands:
Info
Names of Tomcat and PostgreSQL services in these article are an example. Check
which version of these services are installed on your server and use those names in the
commands listed above. For example, if you have installed Tomcat 7 the command 2a
will be service tomcat7 stop
Windows Solution
1. Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.
Info
Version 9.5 of PostgreSQL service in these article is an example. Check which version
of this service is installed on your server and use this name in the commands listed
above. For example, if you have installed Postgresql 9.4 the command 2b will be net
stop postgresql-x64-9.4
Application displays RPC failure error. This happens if session has expired in browser you use to
access the application.
Solution
Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.
Application is not collecting or processing data (syslog, netflow). This is manifested by empty
charts and presence of dropped packets in System view of the corresponding application module.
This can happen due to low memory, power outage on the server.
Linux Solution
Access the server via ssh and execute the following commands:
Execute commands in strict order to avoid improper application restart. Tomcat service
must be started after PostgreSQL for instance.
Check the names of your services before attempting stop and start commands.. Names
of Tomcat and PostgreSQL services may differ on different installations. For Example
Tomcat may be tomcat6 or tomcat7 and PorstgreSQL may be postgresql-9.2 or higher.
Windows Solution
Execute commands in strict order to avoid improper application restart. Tomcat service
must be started after PostgreSQL for instance
1. Stop tomcat
Double click on Apache Tomcat Properties in system tray. In General tab, click Stop to
stop tomcat service.
2. Stop postgresql
Open Command Prompt or Windows PowerShell and type: net stop
postgresql-x64-9.5
3. Start postgresql
net start postgresql-x64-9.5
4. Start tomcat
In General tab of Apache Tomcat Properties, click Start to start tomcat service.
Info
Version 9.5 of PostgreSQL service in these article is an example. Check which version
of this service is installed on your server and use this name in the commands listed
above. For example, if you have installed Postgresql 9.4 the command 2b will be net
stop postgresql-x64-9.4
Here you can see previous request tickets, their statuses and correspondence. You will get
notified on status changes and NetVizura team replies via email.
2. Email
Please do not change the Subject line (eg. "[JIRA] (NetVizura Support) Houston, we've
had a problem! |NVSUP13] "). This will ensure that all relevant information (emails,
comments etc.) are synchronized with the ticket on our Customer Portal.
Submit a Problem
Before submitting a problem, please try to find a solution in the search box provided at http://jira.ne
tvizura.com/servicedesk/customer/portal/1.
If none of the provided resources help, we kindly ask you to send necessary information so that we
can quickly analyze, diagnose and provide solution to your problem:
Example:
NetFlow export is started on the devices but there is no NetFlow traffic in the application.
Solution
General steps:
Linux:
udp 0 0
:::2055
:::*
28004/java off
(0.00/0/0)
Windows:
1. RAM usage
2. DB write time increase
3. Shared Syslog database increase
RAM increase
Depending on the RAM availability it increases it more or less (when RAM is less available it can
increase by only a couple of percentages, when RAM is more available it can increase up to
100%).
There is a way to optimize NetVizura RAM usage by increasing Tomcat memory. Read more about
it under "Tomcat Memory Allocation" section within specific Installation article.
In environments with more than a few hundred End Users, DB write time can have a noticeable
increase. This can significantly degrade application performance (slower displaying of charts,
delayed triggering of NetFlow alarms, loss of data).
This can be solved by changing PostgreSQL configuration. You can find out more about it within In
stallation article under "Tweaking PostgreSQL" section.
If you use also NetVizura EventLog Analyzer, End User syslog logon messages share database
storage with the rest of syslog messages and might increase disk usage thus triggering removal of
old syslog messages sooner.
Consider increasing Maximum database size within Syslog Database Maintenance Options.
1. Syslog export port and NetVizura Syslog socket port do not match
2. NetVizura server has firewall (port is not opened)
3. Devices exporting syslog and NetVizura server are not connected
Syslog export port and NetVizura Syslog socket port do not match
Syslog socket port in > Settings > EventLog Settings > Configuration needs to match the port
on which you are sending syslog messages. You need to (1) redirect syslog messages to the
33514, or (2) export syslog messages to 33514, or (3) change NetVizura EventLog configuration
so that the export port (devices or redirection) match the Syslog socket port in the configuration.
Check the IP table to see if redirection is applied.
On Linux systems ports lower than 1024 can not be used by application. Tomcat web
server running NetVizura EventLog needs to be started by root user to allow NetVizura
EventLog service to listen on ports lower than 1024.
Port to which syslog messages are exported to (Syslog socket port in > Settings > EventLog
Settings > Configuration) might not be opened during installation process, if so, you need to
manually open that port. Check your software firewall on the NetVizura server and open the port.
Iptables is an example of firewall on CentOS and RedHat systems.
Contact your system and network administrators and make sure that all devices exporting syslog
messages have network connection to the server running NetVizura EventLog.
Port lower than 1024 on Linux systems can only be used by root.
Solution
If NetVizura doesn't have root privileges then you need to set the port to one higher than 1024 and
redirect the Syslog messages to that port.
Go to > Settings > Control Panel > SNMP Policies and check the parameters Retry and Ti
meout for the policy used on the device. You can see witch policy is configured on the device by
going to > Settings > Control Panel > Devices.
Check if the access list allows access to the device from NetVizura server (server's IP has to be
permitted).
Device might not be available because network is not working properly, SNMP access is not
permitted or the device is down (no power for instance). Try to ping the device to check it's
availability or contact your network engineers.
MIB can only be added to Modules if all MIBs that it is dependent on are already added in the
Modules. Application will inform you of the list of missing MIBs. You need to download all the
missing MIBs from the list and add them before trying to add the desired MIB again.
In some cases the MIB file can contain syntax error(s) that does not allow the application to pars it.
You can try to fix the file your self, or rise a support case by sending an email to support@netvizur
a.com.
If this is OK, then you need to add a MIB containing the OID to the application. Download the MIB
(from vendor website for instance) and then add it to the database by going to > Settings >
MIB Settings > Modules.
To check privileges of a policy go to > Settings > Control Panel > SNMP Policies and
double click on the policy.
If the problem persist, contact your network engineers to check if the SNMP configuration on a
device is READ only.
In order to get the Set OID option, you need to have write or administrator privileges.
How do I upgrade?
You can find these useful statistics in the System Tab of NetFlow Analyzer. Number of total flows
received, number of flows processed, as well as the number of flows missed due to license
limitation are shown. This data is calculated and refreshed periodically every 5 minutes.
What is NetFlow?
NetFlow is a network protocol, developed by Cisco Systems, used for exporting collected IP flow
traffic. This data is exported to a server, where it is collected, processed, aggregated and archived.
It can then be reviewed in a more user-friendly form. NetFlow Analyzer performs all of these
functions. There are numerous NetFlow protocol versions, most important of which are versions 5
and 9. Version 5 is commonly used on most Cisco NetFlow enabled devices. NetFlow version 9 is
the latest version, created to support advanced technologies such as MPLS, IPv6, Multicast,
VLANs, etc.
However, NetFlow Analyzer has been tested to support NetFlow enabled Cisco devices and IPFIX
from Juniper devices only.
NetFlow Analyzer utilizes Traffic Patterns which are based on IP addresses and not on physical
interfaces, this allows NetFlow Analyzer to support netflow probes - software generated
NetFlow-like protocol. One such (free) software is Softflowd, available at http://code.google.com/p/
softflowd/ .
Indirectly, sFlow is supported if you convert it to NetFlow, using free tool such as sFlow Toolkit,
available at http://www.inmon.com/technology/sflowTools.php .