0% found this document useful (0 votes)
27 views239 pages

NetVizura 4.4.0 User Guide

The NetVizura User Guide provides comprehensive instructions on installation, setup, and usage of the NetVizura 4.4.0 software. It includes sections on system requirements, configuring network devices, and navigating the user interface. Additionally, it covers licensing, updates, and specific configurations for different operating systems.

Uploaded by

Mubashir Vm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views239 pages

NetVizura 4.4.0 User Guide

The NetVizura User Guide provides comprehensive instructions on installation, setup, and usage of the NetVizura 4.4.0 software. It includes sections on system requirements, configuring network devices, and navigating the user interface. Additionally, it covers licensing, updates, and specific configurations for different operating systems.

Uploaded by

Mubashir Vm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 239

NetVizura User Guide

1. NetVizura 4.4.0 User Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4


1.1 What's New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Installation and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.2 Downloading NetVizura . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.3 NetVizura Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2.3.1 Linux Debian Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.2.3.2 Linux Ubuntu Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2.3.3 Linux CentOS Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.2.3.4 Linux CentOS (ISO) Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2.3.5 Windows Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
1.2.4 Configuring Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.2.4.1 Configuring NetFlow Export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.2.4.1.1 Choosing Server Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.2.4.1.2 Configuring NetFlow Export (Ingress vs. Egress) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
1.2.4.1.3 Choosing Exporters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.2.4.1.4 Configuring NetFlow on Cisco Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.2.4.1.5 Exporting Without NetFlow Capable Device (Mirroring to Daemon Server) . . . . . . . . . . . . . . . . . . . . . 44
1.2.4.1.6 Exporting to Multiple Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
1.2.4.2 Installing and Configuring Syslog Agent for End User Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
1.2.4.3 Configuring EventLog Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
1.2.5 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.2.5.1 License Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
1.2.5.1.1 Estimating Number of Flows (NetFlow) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
1.2.5.2 License Renewal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
1.2.6 NetVizura Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.2.6.1 Linux Debian Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.2.6.2 Linux CentOS Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1.2.6.3 Windows Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
1.2.6.4 Linux Ubuntu Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
1.3 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
1.3.1 Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
1.3.1.1 General Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
1.3.1.2 NetFlow Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
1.3.1.3 EventLog Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.3.2 Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.3.2.1 General Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
1.3.2.2 Dashboard Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
1.3.2.3 NetFlow Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
1.3.2.4 EventLog Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
1.3.2.5 MIB Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
1.4 Using NetVizura . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
1.4.1 Using Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
1.4.2 Using NetFlow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
1.4.2.1 Basic NetFlow Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
1.4.2.1.1 Using Charts and Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
1.4.2.1.2 Traffic Distributions (Top Talkers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.4.2.1.3 Exporters and Interfaces Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.4.2.1.4 Traffic Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
1.4.2.1.5 Subnet Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
1.4.2.1.6 Managing NetFlow Favorites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
1.4.2.1.7 Reading NetFlow Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
1.4.2.1.8 Generating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
1.4.2.2 Advanced NetFlow Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
1.4.2.2.1 Advanced Traffic Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
1.4.2.2.2 Viewing End User Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
1.4.2.2.3 Inspecting Raw Data (Flow Records) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
1.4.2.2.4 Using NetFlow Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
1.4.2.2.5 Understanding NetFlow System Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
1.4.2.2.6 Using Activity Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
1.4.3 Using EventLog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
1.4.3.1 Viewing Syslog Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
1.4.3.2 Inspecting Syslogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
1.4.3.3 Viewing SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
1.4.3.4 Understanding Eventlog System Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
1.4.3.5 Using EventLog Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
1.4.3.6 Syslog How to... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
1.4.4 Using MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
1.4.4.1 Searching OIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
1.4.4.2 Setting Current Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
1.4.4.3 Making SNMP Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
1.4.4.4 Managing MIB Favorites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
1.4.4.5 Reading MIB Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
1.5 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
1.5.1 General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
1.5.1.1 User Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
1.5.1.2 SNMP Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
1.5.1.3 Device Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
1.5.1.4 License Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
1.5.1.5 E-Mail Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
1.5.1.6 Display Name Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
1.5.1.7 Time Window Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
1.5.2 NetFlow Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
1.5.2.1 Traffic Pattern Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
1.5.2.1.1 Defining the Traffic of Interest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
1.5.2.1.2 Setting IP Address Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
1.5.2.1.3 Fine-tuning a Traffic Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
1.5.2.1.4 Manual Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
1.5.2.2 Subnet Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
1.5.2.3 Subnet Set Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
1.5.2.4 End User Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
1.5.2.5 TopN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
1.5.2.6 NetFlow Alarm Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
1.5.2.7 NetFlow Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
1.5.2.8 NetFlow Sampling Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
1.5.2.9 NetFlow System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
1.5.2.9.1 Service Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
1.5.2.9.2 NetFlow Database Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
1.5.2.9.3 Archiving Raw Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
1.5.2.9.4 Importing/Exporting Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
1.5.2.9.5 Automatic Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
1.5.3 EventLog Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
1.5.3.1 EventLog Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
1.5.3.2 EventLog Alarm Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
1.5.3.3 Eventlog System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
1.5.4 MIB Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
1.5.4.1 MIB Module Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
1.5.4.2 MIB Option Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
1.6 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
1.6.1 General Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
1.6.1.1 NetVizura is slow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
1.6.1.2 Web interface not running (Linux) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
1.6.1.3 How to recover from Exception caught: 500 The call failed on the server . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
1.6.1.4 How to recover from RPC failure error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
1.6.1.5 How to restart the application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
1.6.1.6 How to submit a request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
1.6.2 NetFlow Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
1.6.2.1 No NetFlow traffic captured . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
1.6.2.2 Performance issues related to End User traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
1.6.3 EventLog Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
1.6.3.1 I do not receive any Syslog messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
1.6.3.2 I set the Syslog socket port to 514 but I am still not receiving syslog messages (Linux) . . . . . . . . . . . . . . . . 230
1.6.4 MIB Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
1.6.4.1 SNMP request lasts too long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
1.6.4.2 SNMP request fails on a device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
1.6.4.3 I can not add a MIB to Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
1.6.4.4 I can not find an OID in the MIB tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
1.6.4.5 I can not set the OID value on a device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
1.7 FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
1.7.1 License FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
1.7.2 NetFlow FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
NetVizura 4.4.0 User Guide
What's New
Installation and Setup
Getting Started
Using NetVizura
Settings
Troubleshooting
FAQ

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 4


What's New
What's new in NetVizura version 4.4:

GENERAL
1. Dashboard added
2. Getting Started guide added
3. Java 8 support added
4. Windows OS supported added (for server installation)
5. Windows troubleshooting added
6. Call-to-action buttons added to Live Demo and Free Trial applications
7. NetFlow exporter limit removed from Free Trial license
8. System requirements updated
9. PostgreSQL logs are now created with the date in the filename and are rotated daily
10. Other minor bugs fixed

NETFLOW ANALYZER
1. All Traffic Pattern provided by default
2. End User Traffic performance optimized
3. High traffic performance optimized
4. Minor GUI improvements made
5. IP addresses in Scheduled Reports bug fixed
6. Other minor bugs fixed

MIB BROWSER
1. MIB module parsing bux fixed

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 5


Installation and Setup

The following instructions are intended for users with administrator privileges (application
and server) and a basic familiarity with netflow export and device configuration.

In this chapter we will guide you through the installation and basic setup related actions:

System Requirements
Downloading NetVizura
NetVizura Installation
Configuring Network Devices
License
NetVizura Update

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 6


System Requirements
System requirements depend primarily on the number of IP flows that will be received and
processed by the system. The bigger the network traffic volume, the higher the number of IP flows. On this page:
This reflects strongly on IP flow processing speed and Raw Data file size. The former rises the
CPU speed requirement and the latter rises the amount of HDD space needed to store Raw Data.
Hardware
In addition to this, HDD space requirement rises with the number of Traffic Patterns and subnets Requirements
you create and with the amount of Raw Data files you decide to store on your system. The number NetFlow
of Traffic Patterns you create also affects the IP flow processing speed. Analyzer
EventLog
Analyzer
Hardware Requirements MIB Browser
Software
Requirements
NetFlow Analyzer Supported OS
Supported
Package (max Assumptions CPU RAM HDD Space Browsers
fps) (avg fps, avg
nodes)

Free (5 fps) 0.5 fps, 8 nodes Singe-core 1.6GHz 2GB 30 MB


processor

Express (50 fps) 5 fps, 60 nodes Singe-core 2.0GHz 2GB 300 MB


processor

SME (500 fps) 50 fps, 120 nodes Singe-core 2.0GHz 3GB 3 GB


processor

2,000 fps, 420 Dual-core 2.0GHz 4GB 120 GB - SAS or


NetFlow Analyzer is highly
Enterprise (5,000
fps) nodes processor SSD in RAID 0 or flexible and you
similar setup with can configure it to minimize
striping system requirements
cost. To get more details
Large Enterprise 35,000 fps, 1,400 Octa-core 2.0GHz 8GB 2.4 TB - SAS or on configuration, see NetFl
(50,000 fps) nodes processor SSD in RAID 0 or ow Settings > Configuration
similar setup with .
striping

Unlimited Contact us
(50,000+ fps)
To learn more on how
calculation is made or how
General assumptions: 30 days of Archive and 365 days of Database history stored. to make your own custom
HDD space estimation, see
NV NetFlow HDD
calculator.xlsx.
These are recommended server requirements based on the assumptions given
in the table above. Average flows processed and monitoring counters impact all
parameters (CPU, RAM and HDD). Archive and Database storing time also
impacts HDD space and may require additional external storage.
NetVizura comes with built-in database which will be installed on the NetVizura
server. You can use a different server for your database to achieve better
performance but note that NetVizura only supports PostgreSQL version 9.3+.
NetFlow Analyzer Raw Data files are stored on the NetVizura server. You can
store them in some other storage, but keep in mind that it can have a
considerable impact on the performance due to large files being transferred
across your network between the NetVizura server and Raw data files storage.

EventLog Analyzer

Max mps Assumptions CPU RAM HDD Space


(alarms)

500 mps 2 alarms Singe-core 1.6 2GB 1.2 TB - SAS or


GHz SSD in RAID 0 or
similar set-up with
To learn more on how
striping calculation is made or how
to make your own custom
HDD space estimation, see
5,000 mps 5 alarms Quad-Core 3.0 2GB 12 TB - SAS or NV EventLog HDD
GHz SSD in RAID 0 or calculator.xlsx.
similar setup with
striping

50,000 mps 10 alarms Octa-Core 3.6 GHz 8GB 120 TB - SAS or


SSD in RAID 0 or
similar setup with
striping

50,000+ mps Contact us

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 7


General assumptions: 30 days of Database history stored.

These are recommended server requirements based on the assumptions given in the
table above. Maximum messages processed and applied alarms impact all parameters
(CPU, RAM and HDD). Database storing time also impacts HDD space and may require
additional external storage.

MIB Browser

Package CPU RAM HDD Space

Minimum Singe-core 1.6GHz 2GB 500 MB


processor

General assumptions: lifetime Database history stored.

Software Requirements

Software Comes with NetVizura Notes

Oracle Java 8 Yes (Linux) Automatically installed with


No (Windows) Linux packages
Required for Windows
installer (download from Oracl
e site)

Apache Tomcat 6, 7 or 8 Yes (Linux) Automatically installed with


No (Windows) Linux packages
Required for Windows
installer (download from Apac
he Tomcat site)

PostgreSQL 9.3+ Yes (Linux) Automatically installed with


No (Windows) Linux packages
Required for Windows
installer (download from Postg
reSQL site)
PostgreSQL 9.5 is
recommended

Supported OS
OS Versions and Distributions Notes

Linux Debian Debian Wheezy 7 (64 bit), Required for DEB package

Linux Ubuntu Ubuntu Precise 12.04 (64-bit) Required for DEB package
Ubuntu Trusty 14.04 (64-bit)

Linux CentOS CentOS 6 (64 bit) Required for RPM package


Autimatically installed with
ISO image

Windows Windows Server 2008 (64 bit) Required for Windows


Windows Server 2012 (64 bit) installer

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 8


Supported Browsers
Browser Versions Notes

Chrome 35.0+ -

Firefox 26.0+ -

Internet Explorer 10.0+ -

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 9


Downloading NetVizura
Use the following steps to download the required files for NetVizura installation:

1. Navigate to Downloads page where latest software version are offered


2. Choose the desired software version from the cards below and click Download
3. Provide your registration information and click Submit
4. Read the given instructions and click on Download link
5. The installer file will be downloaded to your computer

Free Trial licence with evaluation period of 30 days from the day of installation includes the
following functional restrictions:
To upgrade your
NetFlow module allows you to process up to 500 flows per second from unlimited number Free Trial or
of exporters Commercial
EventLog module allows you to process unlimited number of messages from up to three license, read more
exporters at Upgrading
MIB module has no functional restrictions License.
If you want to
transfer your
configuration from
old software
version to new
one, see more at I
mporting/Exporting
Configuration.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 10


NetVizura Installation
NetVizura can be installed on Linux (CentOS and Debian distributions) and Windows OS. The
following sections describe installation procedures for each stated operating system:

Linux Debian Installation


Linux Ubuntu Installation
Linux CentOS Installation
Linux CentOS (ISO) Installation
Windows Installation

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 11


Linux Debian Installation
Before installing NetVizura make sure to set the time on your server correctly. Time On this page:
change after the installation will invalidate the license!

NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Netvizura depends on Oracle Java 1.8, Tomcat 7 and PostgreSQL 9.3 or higher. NetViz Allocation
ura relies on 3rd-party repositories for installation of these software packages.

The installation process has been tested on Debian 7.9.

NetVizura Installation Steps


To install NetVizura follow these steps:

Step 1: Installation of 3rd-party repositories and prerequisite software

Download and execute Debian prerequisite installation script:

apt-get -y install sudo wget


wget
https://www.netvizura.com/files/products/genera
l/downloads/netvizura-4.4.0-prerequisites-debia
n.sh
--output-document=/tmp/netvizura-prerequisites-
debian.sh
sudo
bash /tmp/netvizura-prerequisites-debian.sh

Step 2: NetVizura package installation

Install the NetVizura package downloaded from the website with the command:

dpkg -i downloaded_file_name.deb

Step 3: Verify installation


Now you can go to NetVizura web interface http://<netvizura_server_ip>:8080/netvizura.

Default login credentials:

Username: admin
Password: admin01

For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netviz
ura like in the screenshot below:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 12


If you are behind a firewall / router that blocks some of the redirects required to
download the Oracle Java archive, you can download the JDK tar.gz archive
manually and place it under /var/cache/oracle-jdk7-installer - then, installing the
"oracle-java7-installer" package will use the local archive instead of trying it to
download it itself.

Post Install Steps


After installation tweaking of configuration files is required in order to utilize the installed
RAM to the fullest extent. The main consumers of RAM are operating system, PostgreSQL
database and Tomcat. General rule for distributing memory is to split it in ratio 2:1 between
PostgreSQL and Tomcat with 1 GB or more reserved for operating system. For instance:

Installed RAM PostgreSQL Tomcat OS

4 GB 2 GB 1 GB 1 GB

16 GB 10 GB 5 GB 1 GB

Tweaking PostgreSQL

Tweaking PostgreSQL for best performance is a topic on which many books were written,
but the following are some common sense suggestions. For the curious ones recommended
reads (among countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning
Guide, this article and this book.

In order to apply following tweaks edit file /etc/postgresql/PG_VERSION_NUMBER/mai


n/postgresql.conf. You will need to restart the PostgreSQL service after done editing
with command: service postgresql restart. Almost all of the following parameters
are commented with carron character (#). Be aware that if you comment out the parameter
that has been changed, PostgreSQL will revert to the default value.

In the following example it is assumed that 4 GB of RAM is allocated for PostgreSQL.

Before changing any parameters in postgresql configuration read the provided


comments in the table below for more information regarding specific parameter.

parameter recommended value comment

max_connections 30 NetVizura rarely uses more


than 10 connections
simultaneously, but it is
good to have some reserve.

shared_buffers 1024MB The recommended amount


is RAM/4.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 13


effective_cache_size 2048MB The recommended amount
is RAM/2, possibly even RA
M * 3/4.

checkpoint_segments 32 For write intensive apps (as


NetVizura) it should be at
least 16, with 32 as safe
maximum.

checkpoint_completio 0.8 This parameter can take


n_target values between 0 and 1.
Default is set to 0.5, which
means that the write phase
of checkpoint process will
take half of the checkpoint
timeout time. Increasing this
value will provide more time
for checkpoint write phase
to finish, thus decreasing IO
usage.

work_mem 8MB - 12MB The formula used is max_c


onnections*work_mem
<= RAM/8, but using a bit
more is still fine.

maintenance_work_mem 32MB Speeds up DB self clean


process.

wal_buffers 16MB Increasing wal_buffers is


helpful for write-heavy
systems. Upper limit is
16MB.

full_page_writes off Turning this parameter off


speeds normal operation,
but might lead to either
unrecoverable data
corruption, or silent data
corruption, after power
outage, OS or HDD failure.
The risks are similar to
turning off fsync, though
smaller.

fsync off Don't wait for HDD to finish


previous write operation.
This brings the most benefit,
but if there is power outage,
OS or HDD failure in exact
instant when PSQL issues
write command to HDD, that
data will be lost and the DB
itself could be corrupted. On
the other hand, DB can
issue several magnitude
more write commands in the
same time period and
consider all these done,
thus improving write
performance immensely.

synchronous_commit off Similarly to "fsync" but with


less benefit.

Tomcat Memory Allocation

During installation NetVizura automatically allocates memory for Tomcat process. The
amount allocated to Tomcat process is calculated according to the formula:

(RAMtotal - 1GB) / 3 but no less than 1GB.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 14


For instance:

Total RAM Tomcat

3 GB 1 GB

4 GB 1 GB

16 GB 5 GB

However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):

1. Edit file /etc/default/tomcat7


2. Locate JAVA_OPTS environment variable that defines memory and uncomment it if
it is commented. This line looks something like the following:
JAVA_OPTS="${JAVA_OPTS} -Xmx1024m
-Xms1024m +UseConcMarkSweepGC"
3. Modify the -Xmx parameter to allocate additional memory to Tomcat. Additionally,
set parameter -Xms to the same amount. This should look something like:
JAVA_OPTS="-Djava.awt.headless=true -Xmx2048M
-Xms2048M -XX:+UseConcMarkSweepGC"
4. Save the file and restart Tomcat: service tomcat7 restart

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 15


Linux Ubuntu Installation
Before installing NetVizura make sure to set the time on your server correctly. Time On this page:
change after the installation will invalidate the license!

NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Netvizura depends on Oracle Java 1.8, Tomcat 7 and PostgreSQL 9.3 or higher. Allocation
NetVizura relies on 3rd-party repositories for installation of these software packages.

The installation process has been tested on Ubuntu 14.04.

NetVizura Installation Steps


To install NetVizura follow these steps:

Step 1: Installation of 3rd-party repositories and prerequisite software

Download and execute Debian prerequisite installation script:

apt-get -y install sudo wget


wget
https://www.netvizura.com/files/products/genera
l/downloads/netvizura-4.4.0-prerequisites-ubunt
u.sh
--output-document=/tmp/netvizura-prerequisites-
ubuntu.sh
sudo
bash /tmp/netvizura-prerequisites-ubuntu.sh

Step 2: NetVizura package installation

Install the NetVizura package downloaded from the website with the command:

dpkg -i downloaded_file_name.deb

Step 3: Verify installation

Now you can go to NetVizura web interface http://<netvizura_server_ip>:8080/netvizura.

Default login credentials:

Username: admin
Password: admin01

For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 16


Post Install Steps
After installation tweaking of configuration files is required in order to utilize the installed RAM to
the fullest extent. The main consumers of RAM are operating system, PostgreSQL database and
Tomcat. General rule for distributing memory is to split it in ratio 2:1 between PostgreSQL and
Tomcat with 1 GB or more reserved for operating system. For instance:

Installed RAM PostgreSQL Tomcat OS

4 GB 2 GB 1 GB 1 GB

16 GB 10 GB 5 GB 1 GB

Tweaking PostgreSQL

Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.

In order to apply following tweaks edit file /etc/postgresql/PG_VERSION_NUMBER/main/pos


tgresql.conf. You will need to restart the PostgreSQL service after done editing with
command: service postgresql restart. Almost all of the following parameters are
commented with carron character (#). Be aware that if you comment out the parameter that has
been changed, PostgreSQL will revert to the default value.

In the following example it is assumed that 4 GB of RAM is allocated for PostgreSQL.

Before changing any parameters in postgresql configuration read the provided


comments in the table below for more information regarding specific parameter.

parameter recommended value comment

max_connections 30 NetVizura rarely uses more


than 10 connections
simultaneously, but it is good
to have some reserve.

shared_buffers 1024MB The recommended amount is


RAM/4.

effective_cache_size 2048MB The recommended amount is


RAM/2, possibly even RAM *
3/4.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 17


checkpoint_segments 32 For write intensive apps (as
NetVizura) it should be at
least 16, with 32 as safe
maximum.

checkpoint_completion_ 0.8 This parameter can take


target values between 0 and 1.
Default is set to 0.5, which
means that the write phase of
checkpoint process will take
half of the checkpoint timeout
time. Increasing this value will
provide more time for
checkpoint write phase to
finish, thus decreasing IO
usage.

work_mem 8MB - 12MB The formula used is max_con


nections*work_mem <=
RAM/8, but using a bit more is
still fine.

maintenance_work_mem 32MB Speeds up DB self clean


process.

wal_buffers 16MB Increasing wal_buffers is


helpful for write-heavy
systems. Upper limit is 16MB.

full_page_writes off Turning this parameter off


speeds normal operation, but
might lead to either
unrecoverable data
corruption, or silent data
corruption, after power
outage, OS or HDD failure.
The risks are similar to turning
off fsync, though smaller.

fsync off Don't wait for HDD to finish


previous write operation. This
brings the most benefit, but if
there is power outage, OS or
HDD failure in exact instant
when PSQL issues write
command to HDD, that data
will be lost and the DB itself
could be corrupted. On the
other hand, DB can issue
several magnitude more write
commands in the same time
period and consider all these
done, thus improving write
performance immensely.

synchronous_commit off Similarly to "fsync" but with


less benefit.

Tomcat Memory Allocation

During installation NetVizura automatically allocates memory for Tomcat process. The amount
allocated to Tomcat process is calculated according to the formula:

(RAMtotal - 1GB) / 3 but no less than 1GB.

For instance:

Total RAM Tomcat

3 GB 1 GB

4 GB 1 GB

16 GB 5 GB

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 18


However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):

1. Edit file /etc/default/tomcat7


2. Locate JAVA_OPTS environment variable that defines memory and uncomment it if it is
commented. This line looks something like the following:
JAVA_OPTS="${JAVA_OPTS} -Xmx1024m -Xms1024m +UseConcMarkSweepGC"
3. Modify the -Xmx parameter to allocate additional memory to Tomcat. Additionally, set
parameter -Xms to the same amount. This should look something like:
JAVA_OPTS="-Djava.awt.headless=true -Xmx2048M
-Xms2048M -XX:+UseConcMarkSweepGC"

1. Save the file and restart Tomcat: service tomcat7 restart

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 19


Linux CentOS Installation
Before installing NetVizura make sure to set the time on your server correctly. Time On this page:
change after the installation will invalidate the license!

NetVizura requires working connection to the internet to install required dependent NetVizura
software. After installation is successful you can turn off internet access for NetVizura Installation Steps
server. Post Install Steps
Tweaking
PostgreSQL
Tomcat
Memory
Before installing NetVizura you will have to install: Oracle Java 1.8, Apache Tomcat 6 Allocation
and PostgreSQL 9.3 or higher, in that order.

The installation process has been tested on CentOS 6.6.

NetVizura Installation Steps


To install NetVizura follow these steps:

Step 1: sudo and wget installation: yum -y install sudo wget

Step 2: Apache Tomcat 6 package installation:

1. execute command yum install tomcat6


2. add Tomcat service to system startup: chkconfig tomcat6 on

Step 3: PostgreSQL package installation:

1. edit file /etc/yum.repos.d/CentOS-Base.repo

1. in section [base] add line "exclude=postgresql*"

2. in section [updates] add line "exclude=postgresql*"

2. go to http://yum.postgresql.org/ and choose stable PostgreSQL package in regard to your


CentOS version and architecture.
CentOS 6, 64 bit example: https://download.postgresql.org/pub/repos/yum/9.5/redhat/rhel-
6-x86_64/pgdg-centos95-9.5-2.noarch.rpm

3. in the folder where the file is downloaded execute command yum -y localinstall
pgdg-centos95-9.5-2.noarch.rpm

4. execute command yum -y install postgresql95-server

5. execute command service postgresql-9.5 initdb

6. execute command service postgresql-9.5 start

7. verify that PostgreSQL is running properly with the command service


postgresql-9.5 status

8. add PostgreSQL service to system startup: chkconfig postgresql-9.5 on

Step 4: Installing NetVizura package

After this steps, install the NetVizura package downloaded from the website with the command yu
m -y localinstall downloaded_file_name.rpm

Step 5: Verify installation

Now you can go to NetVizura web interface http://<netvizura_server_ip>:8080/netvizura.

Default login credentials:

Username: admin
Password: admin01

For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 20


Post Install Steps
After installation tweaking of configuration files is required in order to utilize the installed RAM to
the fullest extent. The main consumers of RAM are operating system, PostgreSQL database and
Tomcat. General rule for distributing memory is to split it in ratio 2:1 between PostgreSQL and
Tomcat with 1 GB or more reserved for operating system.

For instance:

Installed RAM PostgreSQL Tomcat OS

4 GB 2 GB 1 GB 1 GB

16 GB 10 GB 5 GB 1 GB

Tweaking PostgreSQL

Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.

In order to apply following tweaks edit file /var/lib/pgsql/PG_VERSION_NUMBER/data/post


gresql.conf. You will need to restart the PostgreSQL service after done editing with command:
service postgresql restart. Almost all of the following parameters are commented with
carron character (#). Be aware that if you comment out the parameter that has been changed,
PostgreSQL will revert to the default value.

In the following example it is assumed that 4 GB of RAM is allocated for PostgreSQL.

Before changing any parameters in postgresql configuration read the provided


comments in the table below for more information regarding specific parameter.

parameter recommended value comment

max_connections 30 NetVizura rarely uses more


than 10 connections
simultaneously, but it is good
to have some reserve.

shared_buffers 1024MB The recommended amount is


RAM/4.

effective_cache_size 2048MB The recommended amount is


RAM/2, possibly even RAM *
3/4.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 21


checkpoint_segments 32 For write intensive apps (as
NetVizura) it should be at
least 16, with 32 as safe
maximum.

checkpoint_completion_ 0.8 This parameter can take


target values between 0 and 1.
Default is set to 0.5, which
means that the write phase of
checkpoint process will take
half of the checkpoint timeout
time. Increasing this value will
provide more time for
checkpoint write phase to
finish, thus decreasing IO
usage.

work_mem 8MB - 12MB The formula used is max_con


nections*work_mem <=
RAM/8, but using a bit more is
still fine.

maintenance_work_mem 32MB Speeds up DB self clean


process.

wal_buffers 16MB Increasing wal_buffers is


helpful for write-heavy
systems. Upper limit is 16MB.

full_page_writes off Turning this parameter off


speeds normal operation, but
might lead to either
unrecoverable data
corruption, or silent data
corruption, after power
outage, OS or HDD failure.
The risks are similar to turning
off fsync, though smaller.

fsync off Don't wait for HDD to finish


previous write operation. This
brings the most benefit, but if
there is power outage, OS or
HDD failure in exact instant
when PSQL issues write
command to HDD, that data
will be lost and the DB itself
could be corrupted. On the
other hand, DB can issue
several magnitude more write
commands in the same time
period and consider all these
done, thus improving write
performance immensely.

synchronous_commit off Similarly to "fsync" but with


less benefit.

Tomcat Memory Allocation

During installation NetVizura automatically allocates memory for Tomcat process. The amount
allocated to Tomcat process is calculated according to the formula:

(RAMtotal - 1GB) / 3 but no less than 1GB.

For instance:

Total RAM Tomcat

3 GB 1 GB

4 GB 1 GB

16 GB 5 GB

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 22


However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):

1. Edit file /etc/tomcat6/tomcat6.conf


2. Locate JAVA_OPTS environment variable that defines memory This line looks something
like the following:
JAVA_OPTS="${JAVA_OPTS} -Xmx1024m -Xms1024m"
3. Modify the -Xmx and -Xms to the same amount. This should look something like:
JAVA_OPTS="${JAVA_OPTS} -Xmx2048M -Xms2048M"
4. Save the file and restart Tomcat: service tomcat6 restart

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 23


Linux CentOS (ISO) Installation
On this page:
The following guide shows how to install CentOS-6.5 with NetVizura.

netvizura-x.y.z-linux.iso is a modified installation of CentOS-6.5-x86_64-Minimal.ISO Linux NetVizura


operating system. The ISO provides fast and easy way to install NetVizura and operating system Installation Steps
on your virtual or hardware machine. Post Install Steps

CentOS.6.5-NetVizura.iso includes following software packages:

CentOS-6.5-x86_64-Minimal.ISO: http://wiki.centos.org/Manuals/ReleaseNotes/CentOSMi
nimalCD6.5;
various dependency packages: sudo, Java-jdk-7u51-linux-x64, Tomcat6,
postgresql93-server;
NetVizura RPM installation package.

If you are installing on VM by using hypervisor:

Some hypervisors can bypass boot scripts using its own OS installation rules
from selected templates.
When you create VM for netvizura-x.y.z-linux.iso, do not use any hypervisor
templates which refer to some OS.
Select Other from selection menu, attach netvizura-x.y.z-linux.iso on virtual
CD controler and boot ISO straight from virtual CD.
If Welcome screen (shown in the first step below) appears d
uring boot, then the installation is properly launched.

NetVizura Installation Steps


Step-by-step guide:

Step 1: Select Auto-Installer

First screen shows the following options:


Use Tab, arrows or
Page Up/Down to
move between
options
Use Space to
confirm the
selection

On this screen choose "NetVizura Auto-installer" option and press Enter.

This will lead you to complete installation of NetVizura software with all necessary software
dependency packages.

Step 2: Configure network

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 24


On the following "Configure TCP/IP" screen you can set up the network subsystem.

Select IP version support option (either Enable IPv4 support or Enable IPv6 support)
Select suboption:
Dynamic IP configuration (DHCP): Choose this option if you have DHCP server
in your network and wait for NetworkManager to configure your network interface.
Manual configuration: Choose this option for manual network configuration

Step 3: Choose your zone

Be sure to set time correctly:

It is very important to set the correct UTC time in your BIOS setup because traffic
analysis, charts and logs depend on it.

Also, set the time before installation. Time change after the installation will invalidate the
license!

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 25


Step 4: Choose Root Password

Insert your root password


Confirm your password and press Enter.

Step 5: Wait for package installer to complete the installation.

Step 6: Post installation scripts will automatically install NetVizura RPM package.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 26


Step 7: Automatic booting into CentOS.6.5 with NetVizura software

If you are installing on VM by using hypervisor:

Some hypervisors like xencenter will not run automatic booting. You will be prompted
again in welcome screen and asked to choose an option. Now, you should choose
option "Boot from local drive":

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 27


Step 8: After boot the following screen will appear

Step 9: Verify installation

Now you can go to NetVizura web interface http://<netvizura_server_ip>:8080/netvizura.

Default login credentials:

Username: admin
Password: admin01

For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:

Post Install Steps


See Post install steps in article Linux CentOS Installation.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 28


Windows Installation
Before installing NetVizura make sure to set the time on your server correctly. Time On this page:
change after the installation will invalidate the license!
NetVizura
Installation Steps
Post Install Steps
Before installing NetVizura you will have to install: Oracle Java 8, Tomcat 7 or Tomcat 8 Tweaking
and PostgreSQL 9.3 or higher (9.5 recommended), in that order. The installation process PostgreSQL
has been tested on Windows Server 2008 R2 and Windows Server 2012 R2. Tomcat
Memory
Allocation

NetVizura Installation Steps


To install NetVizura on Windows follow these steps:

Step 1: Download and install Oracle Java 8 from Oracle official website www.oracle.com/technetw
ork/java/javase/downloads/index.html

Step 2: Download and install Tomcat 7 or Tomcat 8 as a service from Tomcat official website tomc
at.apache.org. 32-bit/64-bit Windows Service Installer is available on the downloads page.

Make sure to install Tomcat as a service, otherwise NetVizura installation won't


be able to complete successfully.
Make sure you have exactly one version of Tomcat installed on your system,
otherwise application might not work as expected.

When prompted for the installation type, choose Full installation. This will enable Tomcat to start on
boot.

Step 3: Download and install PostgreSQL 9.3+ from PostgreSQL official website http://www.postgr
esql.org/download/windows/

While installing PostgreSQL you will be prompted for password; make sure that
you type in "postgres"!
Make sure you have exactly one version of PostgreSQL installed on your
system, otherwise NetVizura might not work as expected or at all.

Step 4: Download NetVizura Windows Installer from NetVizura website and run installer with

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 29


administrative privileges

Step 5: Follow the installation steps

Step 6: Verify installation

Now you can go to NetVizura web interface http://<netvizura_server_ip>:8080/netvizura.

Default login credentials:

Username: admin
Password: admin01

For example, if your server IP is 1.1.1.1 then point your browser to http://1.1.1.1:8080/netvizura like
in the screenshot below:

Post Install Steps


After installation tweaking of configuration files is required in order to utilize the installed RAM to
the fullest extent. The main consumers of RAM are operating system, PostgreSQL database and
Tomcat. General rule for distributing memory is to split it in ratio 2:1 between PostgreSQL and
Tomcat with 1 GB or more reserved for operating system. For instance:

Installed RAM PostgreSQL Tomcat OS

4 GB 2 GB 1 GB 1 GB

16 GB 10 GB 5 GB 1 GB

Tweaking PostgreSQL

Tweaking PostgreSQL for best performance is a topic on which many books were written, but the
following are some common sense suggestions. For the curious ones recommended reads (among
countless others) are PostgreSQL Optimization Guide, PostgreSQL Tuning Guide, this article and
this book.

In order to apply following tweaks edit file postgresql.conf, this file is usually located in
PostgreSQL data folder. You will need to restart the PostgreSQL service after done editing. Almost
all of the following parameters are commented with carron character (#). Be aware that if you
comment out the parameter that has been changed, PostgreSQL will revert to the default value.

In the following example it is assumed that 4 GB of RAM is allocated for PostgreSQL.

Before changing any parameters in postgresql configuration read the provided


comments in the table below for more information regarding specific parameter.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 30


parameter recommended value comment

max_connections 30 NetVizura rarely uses more


than 10 connections
simultaneously, but it is good
to have some reserve.

shared_buffers 1024MB The recommended amount is


RAM/4.

effective_cache_size 2048MB The recommended amount is


RAM/2, possibly even RAM *
3/4.

checkpoint_segments 32 For write intensive apps (as


NetVizura) it should be at
least 16, with 32 as safe
maximum.

checkpoint_completion_ 0.8 This parameter can take


target values between 0 and 1.
Default is set to 0.5, which
means that the write phase of
checkpoint process will take
half of the checkpoint timeout
time. Increasing this value will
provide more time for
checkpoint write phase to
finish, thus decreasing IO
usage.

work_mem 8MB - 12MB The formula used is max_con


nections*work_mem <=
RAM/8, but using a bit more is
still fine.

maintenance_work_mem 32MB Speeds up DB self clean


process.

wal_buffers 16MB Increasing wal_buffers is


helpful for write-heavy
systems. Upper limit is 16MB.

full_page_writes off Turning this parameter off


speeds normal operation, but
might lead to either
unrecoverable data
corruption, or silent data
corruption, after power
outage, OS or HDD failure.
The risks are similar to turning
off fsync, though smaller.

fsync off Don't wait for HDD to finish


previous write operation. This
brings the most benefit, but if
there is power outage, OS or
HDD failure in exact instant
when PSQL issues write
command to HDD, that data
will be lost and the DB itself
could be corrupted. On the
other hand, DB can issue
several magnitude more write
commands in the same time
period and consider all these
done, thus improving write
performance immensely.

synchronous_commit off Similarly to "fsync" but with


less benefit.

Tomcat Memory Allocation

During installation NetVizura automatically allocates memory for Tomcat process. The amount

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 31


allocated to Tomcat process is calculated according to the formula:

(RAMtotal - 1GB) / 3 but no less than 1GB.

For instance:

Total RAM Tomcat

3 GB 1 GB

4 GB 1 GB

16 GB 5 GB

However, if you need to tweak Tomcat RAM allocation differently (the example for 2048MB):

1. Double click on Apache Tomcat Properties in system tray

2. In Java tab under Java options modify the -Xmx parameter to allocate additional memory
to Tomcat. Additionally, set parameter -Xms to the same amount. Also set Initial memory
pool and Maximum memory pool to the same amount. This should look like on picture
below.

3. Back to the General tab, click Stop and Start to restart Tomcat.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 32


Configuring Network Devices
Configuring NetFlow Export
Installing and Configuring Syslog Agent for End User Traffic
Configuring EventLog Logging

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 33


Configuring NetFlow Export
In terms of NetFlow export, there are two basic types of network devices:

Exporters - network devices capable of netflow statistics export (for instance routers or L3
switches).
Server - the computer that collects netflow statistics from exporters. This is also
the computer on which NetVizura NetFlow Analyzer is installed.

The following issues should be addressed regarding network devices configuration:

Choosing Server Location


Configuring NetFlow Export (Ingress vs. Egress)
Choosing Exporters
Configuring NetFlow on Cisco Devices
Exporting Without NetFlow Capable Device (Mirroring to Daemon Server)
Exporting to Multiple Servers

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 34


Choosing Server Location
NetFlow Server location in the network depends on the network topology. The amount of netflow
data exported from network devices is in direct correlation to the amount of traffic passing through For security reasons, it is
that device (exporter). Studies show that the netflow traffic is 0.5% to 2% of total traffic, therefore recommended that you set
NetFlow Server should not be “too far” from the exporter. a separate VLAN for
the NetFlow Server and
More important parameters are the availability and security of the NetFlow Server. NetFlow Server raise a firewall on the
is usually connected to the central network node or close to it, because the most of the traffic server for its protection.
passes through this node. In the case of an exporter or link fail, it is important to have NetFlow
Server still available so you can analyze the traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 35


Configuring NetFlow Export (Ingress vs. Egress)
The following explains in which situations is better to use incoming (in/Ingress) or outgoing
(out/Egress) flow on the interface for collecting NetFlow traffic.

Incorrect NetFlow Export

On the figure above you can see that interfaces Gi1/1 and Gi1/2 are set to collect NetFlow traffic,
Gi1/1 in IN direction and Gi1/2 in OUT direction. This example shows that a flow traveling from
Host A to Host B will be collected and exported twice to NetFlow server, while a flow traveling from
Host B to Host A will not be matched and exported. The result is a false NetFlow traffic: double
amount of flows for A to B direction, and zero flows for B to A direction.

It is very important that all interfaces on a single device are configured to collect flow in
only one direction, IN or OUT.

Correct NetFlow Export

Here, both interface Gi1/1 and interface Gi1/2 are set to collect the NetFlow traffic in IN direction.
This time, a flow traveling from Host A to Host B will be collected only once, and a flow traveling
from Host B to Host A will be collected as well. Now, NetFlow traffic will be correct and none of the
charts in TopN > Exporters will have duplicated data.

Ingress or Egress?

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 36


When considering to configure Ingress or Egress flow on an exporter device, you must
be aware that it depends on software version and supervisor module (if existing). For this
information, please check release notes of your device vendor.

Ingress export enabled on all the interfaces of a device will in general deliver all necessary
information. It is specially recommended in the following situations:

1. NetFlow v9 supports Ingress and Egress, but NetFlow v5 only supports Ingress flows. If
your device is only supported by NetFlow v5, your flows should necessarily be Ingress.
2. In addition, Ingress export provides monitoring of Blocked traffic (traffic sent to Interface
Out 0).

Egress should be considered in these situations:

1. Some routers (e.g. Cisco WAAS, Riverbed, etc.) have option to compress flows, so the
Out traffic will be significantly larger than In traffic. Egress export provides more precise
information on traffic transferred in the network.
2. When multicast flows are sent, Ingress exported flows have a destination interface 0
because the router doesn’t know interface Out before processing. Egress exported flows
deliver the destination interfaces, and in addition if the flow is headed for multiple
interfaces it will be exported as multiple flows.

Continue reading on to Choosing Exporters.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 37


Choosing Exporters
If you have a large network with many routers and switches, exporting NetFlow from all these
devices might significantly impact the complexity of export configuration, NetFlow Analyzer On this page:
performance, as well as license needed.

This article will help you decide which devices exactly to choose as necessary for your netflow Choosing Traffic to
export and overcome these challenges. Export
Incomplete
Traffic Export
Choosing Traffic to Export Complete
Traffic Export
The basic principle is to export only the traffic that is of your interest. For this reason, it is Deciding Whether
necessary for you first to understand well your network topology and flow routing. to Use Automatic
Deduplication
For example, you can export netflow only from devices in data center and regional units, and not Automatic
from branch locations. Or, if you want to make Traffic Pattern that captures all internal company's Deduplication
traffic where part of the traffic passes via central router and part passes directly between other Disabled
routers, then you should export from all these routers. Automatic
Deduplication
Incomplete Traffic Export Enabled
Automatic
Deduplication
Not Possible

If you are evaluating


NetFlow module, we
recommend you to include
export from all desired
devices (as it should be on
live production), so that you
could correctly estimate fps
baseline needed for
Licensing. Read more
about Estimating Number
of Flows (NetFlow).

This is a situation when netflow traffic is not exported for one part of the network. The traffic that
passes through the central router (Host A to Host B) will be captured, while traffic that does not
pass via central router (Host C to Host D) will not.

Complete Traffic Export

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 38


Figure above shows an example of communication when we want to monitor communication that is
not passing through the central router. It is necessary to configure the netflow export on network
devices on which that communication is passing through.

Deciding Whether to Use Automatic Deduplication

Since Exporters charts present data as they are actually exported by devices, none of the Exporter
traffic will have duplicated data.

However, when you create Traffic Patterns and Subnet Sets they may include data exported by
multiple exporters and as a consequence netflow data will be duplicated. This naturally depends on
which devices are configured as exporters, as well as traffic routing and network topology.

Automatic Deduplication Disabled

When automatic deduplication is disabled, a flow traveling from Host A to B and passes via
multiple exporters, NetFlow Server will receive same flow from R1, R2 and R3 so flow will be proce
ssed three times.

Automatic deduplication is enabled by default. To disable it, go to > Settings >


NetFlow Settings > Configuration > Automatic Deduplication and select Disable.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 39


Automatic Deduplication Enabled

Automatic deduplication solves this problem based on the next hop - when an exporter exports a
flow, and this flow includes IP address of another exporter as next hop information, then the flow
will be skipped by the Traffic Pattern/Subnet Set counter.

For example, when three consecutive routers in the flow route are exporting flows then NetVizura
will have enough information to skip flows from R1 and R2 (since R2 and R3 exporters are
mentioned as next hop) and include only flow from R3 in the Traffic Pattern.

In order to achieve automatic flow deduplication in Traffic Patterns and Subnet Sets, it is
required that ALL devices in flow continuity are configured as exporters.

Automatic Deduplication Not Possible

However, sometimes not possible to achieve automatic deduplications. For example, if device is
not NetFlow export capable, when part of the network is managed by third party (ISP) or if
exporting from too much devices is not desired.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 40


In the figure above, we see that even though automatic deduplication is enabled, flow will be
duplicated by two exporters (R1 and R3) that are not in the flow continuity (R3 will not be In case it is not possible to
mentioned as next hop in R1 flow export). enable automatic
deduplication by exporting
all devices in flow
continuity, deduplication
could also be achieved
manually. Read more at M
anual Deduplication.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 41


Configuring NetFlow on Cisco Devices

It is recommended that only users with experience in configuring Cisco devices follow
these steps.

This section offers a brief guide for setting up NetFlow on a Cisco router or switch. For more
detailed information, refer to the Cisco website.

Device Supported

Cisco 800, 1700, 2600 Yes

Cisco 1800, 2800, 3800 Yes

Cisco 4500 Yes

Cisco 6500 Yes

Cisco 7200, 7300, 7500 Yes

Cisco 7600 Yes

Cisco 10000, 12000, CRS-1 Yes

Cisco 2900, 3500, 3660, 3750 Yes

Software Platform Configuration

The following is an example of a basic router configuration for NetFlow. NetFlow basic functionality
is very easy to configure. NetFlow is configured on a per interface basis. When NetFlow is
configured on the interface, IP packet flow information will be captured into the NetFlow cache.
Also, the NetFlow data can be configured to export the NetFlow data to the NetFlow Server.

1. Configuring the interface to capture flows into the NetFlow cache. CEF followed by NetFlow
flow capture is configured on the interface

Router(config)# ip cef
Router(config)# interface ethernet 1/0
Router(config-if)# ip flow ingress

Or

Router(config-if)# ip route-cache flow

Either ip flow ingress or ip route-cache flow command can be used depending on the Cisco
IOS Software version. IP flow ingress is available in Cisco IOS Software Release 12.2(15)T or
above.

2. For exporting the NetFlow cache to the NetFlow Server. A version or a format of the NetFlow
export packet is chosen and then the destination IP address of the server (in this example
172.22.23.7). The 2055 is the UDP port the NetLow Server will use to receive the UDP export from
the Cisco device. 2055 is a default value, you can change this as described in chapter Configuring
the service settings on page 141 (Collection port).

Router(config)# ip flow-export version 9


Router(config)# ip flow-export destination 172.22.23.7 2055

More Information on NetFlow Configuration is available at Cisco website.

Cisco Catalyst 6500 Series Switch Platform NetFlow Configuration

The following is an example of NetFlow on a Cisco Catalyst 6500 Series Switch. The Cisco
Catalyst 6500 Series Switch has two aspects of NetFlow configuration, configuration of hardware
based NetFlow and software NetFlow. Almost all flows on the Cisco Catalyst 6500 Series Switch
are hardware switched and the MLS commands are used to characterize NetFlow in hardware.
The MSFC (software based NetFlow) will characterize software based flows for packets that are
punted up to the MSFC.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 42


Figure above shows the concept of two paths for NetFlow packets, the hardware (red)
and software (blue) paths and the configuration for each path. Normally on Cisco Catalyst 6500
Series Switch both hardware and software based NetFlow is configured.

The hardware switched flows use the MLS commands to configure NetFlow. Remember that for
the hardware based flows NetFlow is enabled on all interfaces when configured.

mls aging normal 32 (Set aging of inactive


flows to 32 seconds)
mls flow ip interface-full (Optionally
configure a flow mask)
mls nde sender version 5 (Specify the version
for export from the PFC)
mls nde interface (send interface information
with the export, command available by default
with Supervisor720/Supervisor 32)

The following is the configuration for NetFlow on the MSFC for software based flows. This
configuration is equivalent to what is shown in Cisco Catalyst 6500 Series Switch Platform NetFlow
Configuration. The user configures NetFlow per interface to activate the flow characterization and
also configures an export destination for the hardware and software switched
flows.

interface POS9/14
ip address 42.50.31.1 255.255.255.252
ip route-cache flow (also ip flow ingress
can be used)
ip flow-export version 5 (The export
version is setup for the software flows
exported from the MSFC)
ip flow-export destination 10.1.1.209 2055
(The destination for hardware and software
flows is specified)

More Information on the Cisco Catalyst 6500 Series Switch NetFlow Configuration can be viewed
at Cisco website.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 43


Exporting Without NetFlow Capable Device (Mirroring to Daemon Server)
In the situation when network device is not supporting NetFlow protocol, the concept of
Traffic Patterns allows you to redirect traffic to the server with a netflow probe. The netflow probe
analyzes traffic and generates netflow traffic. We will call the server on which this probe is started
the NetFlow Daemon Server. Figure below shows an example of this situation:

Figures above show the redirection of traffic (port mirroring) to the server on which the NetFlow
Daemon Server is started. When the port mirroring is started on a switch, interface to whom all
traffic is directed to becomes useless for normal device communication. It only passes all of its
traffic (In and Out) from port mirroring interface.

The problem is: How to export netflow traffic if the interface on which the NetFlow Daemon
Server is connected to is unusable for normal communication?

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 44


One solution is to add additional network card to the server and connect to the switch.
This configuration enables netflow exporting even from the L2 switches. The drawback is the
additional port utilization on the switch and the need for an additional server. One port on the
switch is used for receiving mirrored In/Out traffic and another one for exporting netflow traffic. The
blue arrow in the figure above shows netflow export from the additional network card on the
server.

Now, it is possible to start the netflow probe on the NetFlow Daemon Server. One of these
applications is the SoftFlowd that has the possibility of exporting netflow traffic locally (127.0.0.1) to
the UDP port on the same server or to a UDP port on a remote server.

Above figures show examples of local netflow export and remote netflow export.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 45


Exporting to Multiple Servers
Often it is necessary to export netflow traffic on more than one server (production, development,
test...). Having in mind that Cisco, Juniper and other devices can often export netflow data only on
two devices, there is a need for tools for multiplication of netflow traffic.

One of these tools is Samplicator. It is a software packege for Linux that listens to UDP datagrams
at defined port and sends copies to set of other IP addresses we define.

Samplicator works according to the figure below:

How to do it:

1. Download latest Samplicator version here


2. Unpack: tar -zxf samplicator-x.y.z.tar.gz
3. Go to directory: cd samplicator-x.y.z
4. As a root run configure script: ./configure
5. Make command to make binary files: make
6. Then install application with command: make install
7. Softver will run with command: samplicate

In This example NetFlow Samplicator Server receives traffic from exporter 10.0.0.254 via port
2000, then sends copies to multiple NetFlow Servers via port 2055:

samplicate -S -f -p 2000 10.0.16.13/2055


10.0.17.8/2055 10.0.22.101/2055

Optional commands to use:

Option Description

-p <port> UDP port to accept flows on (default 2000)

-s <address> Interface address to accept flows on (default


any)

-d Debug level

-b Set socket buffer size ( default 65536)

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 46


-n Do not compute UDP checksum (leave at 0)

-S Maintain (spoof) source address.

-x <delay> Transmission delay in microseconds.

-c Specify a config file to read.

-f Fork. This option sets samplicate to work as


background process.

For help use:

samplicate -h

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 47


Installing and Configuring Syslog Agent for End User Traffic
End User Traffic functionality requires separate Syslog agent to be installed on working stations or
domain controller.

NetVizura, by default, includes built-in support for Snare OpenSource agent. Installation and
configuration of Snare agent is described in the following steps.

If you have another Syslog agent then you can create a separate rule for that agent: End User
Settings.

1. Step - Downloading Snare OpenSource

Download Snare OpenSource Syslog agent from the official website, www.intersectalliance.com.

2. Step - Installing Snare agent on Windows

Install Snare OpenSource agent on domain controller and/or Windows working station by following
these instructions.

Run Snare OpenSource installer with administrative privileges


Accept License Agreement and press next
Leave defaults for EventLog configuration and press next
Select Use System account and press next
Choose to enable Web access for Snare Remote Control Interface and be sure that you
enter password to protect configuration interface and press next.
From now on just click next til the end of installation.

3. Step - Configuring Snare

If you have followed previous steps carefully, you will be able to access Remote Control Interface
using your browser of choice.

To access Remote Control Interface paste http://localhost:6161/ into your address bar in your
browser and press Enter.

In order to fully configure Snare OpenSource agent to work correctly with NetVizura follow these
steps.

1. Network configuration
Click on Network Configuration on the left side of the Control Interface. Locate Destinati
on Snare Server address field and put IP address of your NetVizura server here.
Open NetVizura application, and navigate to > Settings > NetFlow Settings >
Configuration and search for End users collection port value.
By default collection port should be set to 33515. Locate Destination Port field in Snare
Remote Control Interface and paste the port value from NetVizura Settings configuration.
To finish network configuration check Enable Syslog Header checkbox. Click Change
Configuration to save changes.

2. Objectives Configuration

Click on Objectives Configuration on the left side of the Control Interface.


Make sure that objective named Logon_Logoff exists in the list.
Other objectives are not needed for NetVizura to work properly and therefore can be
deleted from the list.

3. Apply new configuration


In order for new configuration settings to be applied you should restart Snare service by
executing following commands inside Windows command prompt.

Make sure to run Command Prompt with Administrative privileges

First stop Snare service by running:

net stop snare

After that, start Snare again by running:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 48


net start snare

By now, you should have your Snare agent successfully installed and configured to work with
NetVizura.

Follow step 4 to make sure that NetVizura is actually receiving Syslog messages from Snare
agent.

If tcpdump is not installed


4. Step - Checking installation and configuration on your server do the
following:
Linux
Debian/Ubuntu
If you have EventLog module activated, you can easily check if you are receiving Syslog messages
by going to EventLog > Syslog tab.
sudo
Otherwise, login to your NetVizura server over SSH, and first check if NetVizura is listening for
apt-g
Syslog messages on specified port.
et
In order to perform this check run the following command inside your shell. updat
e
netstat -lnup | grep 33515 sudo
apt-g
et
33515 is a default port. If you have configured collection port to have another value, put that value insta
in the previous command instead of 33515.
ll
If collection is working fine you should see something similar to the following after running this tcpdu
command. mp

udp 0 0 :::33515 :::*


31414/jsvc.exec
CentOS

Next, check if Snare agent is sending syslog to Netvizura collector by running tcpdump.
sudo
yum
tcpdump port 33515 updat
e
sudo
Once again, default port value is used. In case some other value is configured through Settings,
replace that value into provided command. yum
insta
After running tcpdump command, you shoud see packets incoming to your server from
workstations or domain controller.
ll
tcpdu
Windows mp

If you are running NetVizura on Windows Server, you can use packet analyzer tools for windows (
wireshark, windump, etc).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 49


Configuring EventLog Logging
Most devices use the syslog and SNMP protocol to manage system logs, events and alerts. As an On this page:
example, this section offers a brief guide for setting up Cisco devices logging to NetVizura server.
For more detailed information, refer to the Cisco website.
Configuring Cisco
Routers for Syslog
Before configuring a Cisco device to send syslog messages, make sure that it is Configuring Cisco
configured with the right date, time, and time zone. Syslog data would be useless for Routers for SNMP
troubleshooting if it shows the wrong date and time. Trap

Configuring Cisco Routers for Syslog

1. Router# configure terminal - Enters global configuration mode.

2. Router(config)# service timestamps type datetime [msec]


[localtime] [show-timezone] - Instructs the system to timestamp syslog
messages.

3. Router(config)# logging host [transport] [udp] [port port-num] - Sp


ecifies the syslog server by IP address or host name; you can specify multiple servers. Default destination port
4. Router(config)# logging trap level - Specifies the kind of messages, by number on Cisco devices f
severity level, to be sent to the syslog server. The default is informational and or syslog export is 514.
lower. Possible values are emergencies: 0, alerts: 1, critical: 2, error: 3, warnings: 4, Default port number for
receiving syslog on
notifications: 5, informational: 6, debugging: 7.
Netvizura is 33514. If your
5. Router(config)# logging facility facility-type - Specifies the facility level
server does not forward por
used by the syslog messages; the default is local7.
t 514 to 33514, you have to
6. Router(config)# end - Returns to privileged EXEC mode.
set 33514 for syslog
destination port on your
7. Router(config)# show logging - displays the addresses and levels associated with
devices.
the current logging setup, and any other logging statistics.

Use the debugging level with caution when configuring logging trap level, because it can
generate a large amount of syslog traffic in a busy network.

Example

Router-Netvizura# configure terminal


Enter configuration commands, one per line. End with CTRL/Z.
Router-Netvizura(config)# logging 192.168.1.50
Router-Netvizura(config)# service timestamps debug datetime
localtime show-timezone msec
Router-Netvizura(config)# logging facility local7
Router-Netvizura(config)# logging trap notifications
Router-Netvizura(config)# end
Router-Netvizura# show logging

Configuring Cisco Routers for SNMP Trap

1. Router# configure terminal - Enters global configuration mode.

2. Router(config)# snmp-server community snmp_community_string <ro or


wr> - Specifies the read-only or write-read SNMP community string.

3. Router(config)# snmp-server host IP_Address version <1 or 2c>


snmp_community_string - Specifies the IP Address of the device to which the traps
have to be sent along with SNMP version and SNMP community string.
For configuring SNMP
community in Netvizura
4. Router(config)# snmp-server enable traps [notification-type]
application, refer to Configu
[notification-option] - Specifies the SNMP trap types if you do not want to send ring SNMP Policies.
all traps to server.

Example

Router-Netvizura# configure terminal


Enter configuration commands, one per line. End with CTRL/Z.
Router-Netvizura(config)# snmp-server community public ro
Router-Netvizura(config)# snmp-server host 192.168.1.50
version 2c public
Router-Netvizura(config)# snmp-server enable traps ospf
Router-Netvizura(config)# end

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 50


License
NetVizura modules (NetFlow, EventLog and MIB) are activated with a license key which is bound
to NetVizura server via Installation key.

Different modules have different license models:

NetFlow Analyzer license depends on the number of flows you are exporting to NetVizura
server, regardless of the number of exporters (routers and switches) and their interfaces
involved. You can collect data from as many devices as you need and the total number of flows will
reflect your network traffic volume.

With this approach you have a possibility for a wider usage of NetFlow software across
your network and choose the license that best fits your network traffic volume.

EventLog Analyzer license has no limitations on number of exporters or syslog and SNMP traps
received.

MIB Browser license has no limitations of usage.

The following sections provide instruction for licensing NetVizura:

License Upgrade
License Renewal

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 51


License Upgrade
To upgrade your current licence (converting Free Trail to Commercial license, or lower
Commercial to higher Commercial license) you need to purchase appropriate If you are upgrading
Commercial license. For help with finding an optimal license for you, complete this Get Quote form NetFlow Analyzer to a
higher Commercial
on our web site or get in touch with us at [email protected].
license, first you need to
estimate how many flows
After this, you should provide us with the Installation Code for your NetVizura server so we can
you need. For more
issue you a license key.
instruction go to Estimating
Number of Flows (NetFlow
To send us the Installation Code:
Analyzer License)
1. Log in as admin
2. Go to > Settings > Control Panel > License
3. Click Send to send us an automatically filled out e-mail with your Installation Code

After we receive the Installation Code, we will send you your license key in one working day. Note
that you can apply the license key to your existing installation keeping your configuration and data.

To apply your License key:

1. Go to > Settings > Control Panel > License


2. Click Upload license key
3. Find the path to the new License key
4. Click Open

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 52


After the new license key is loaded a popup window will appear prompting you to reset NetVizura
(log-out and log-in again). When you log-in again, verify that the new license has been applied by
checking About or by going to > Settings > Control Panel > License.

Should you experience any difficulties with application of your licence key, do not hesitate to email
us at [email protected].

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 53


Estimating Number of Flows (NetFlow)
The best way to estimate number of flows needed for your NetFlow Analyzer Commercial license
is based on your past data.

To do this:

1. Log in as admin
2. Go to Top N > System
3. Click Flows tab
4. Choose the Last Month in the Time Window

While testing on Free Trial


license, we recommend
you to include export from
all desired devices (as it
should be on live
production), so that you
could correctly estimate fps
baseline needed for
Commercial license.

In the Number of flows graph you will notice peaks in traffic. These peaks will tell when you had the
highest rate of flows exported by your devices. When you choose the
Commercial license, be
Max Total stored value in the table will give you the maximum number of flows per second sure to choose the one that
exported by your network devices (highest peak) for the selected Time Window. has the flow per second
limit reasonably higher than
the maximum. This will
ensure that you are able to
analyse data peaks that
On Free Trial license, Unlicensed flows mean that your network exports more than 500 correspond to traffic
fps limit. You should take into consideration both Processed and Unlicensed flows for anomalies or security
your Commercial license. issues like Denial of
Service Attack.
On Commercial license, Unlicensed flows mean that your network devices are exporting
more flows than your current Commercial license allows.These flows will not be
processed and, therefore, information provided by them will not be included when
creating and displaying traffic statistics. In this case, you should upgrade your
Commercial license.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 54


License Renewal
NetVizura provides two types of Commercial licenses: Perpetual and Subscription license. Perpetu
al license includes unlimited usage and first year maintenance and support, whereas Subscription
license includes one year usage, maintenance and support.

In any case, after your current maintenance and support expires you need to purchase a new
license key that allows software update and support tickets. For help with payment requests, get in
touch with us at [email protected].

For the new license key, you should provide us with your Installation Code.

Error rendering macro 'excerpt-include' : No link could be created for 'Upgrading License'.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 55


NetVizura Update
Linux Debian Update
Linux CentOS Update
Windows Update
Linux Ubuntu Update

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 56


Linux Debian Update
Notice

1. NetVizura might
NetVizura requires working connection to the internet to install required update. After
not work properly if
update is successful you can turn off internet access for NetVizura server.
updated from more
older versions. We
kindly urge you to
first successively
Step-by-step guide update it to
previous version,
1. Check free space on disk with df -h command. If there is less than 8GB of free space on and then to current
disk, delete some files to make at least 8GB available space on disk (easiest way is to version.
delete old raw data files in archive which is usually located in /var/lib/netvizura/fl 2. NetVizura will not
ow/archive) work if update is
2. Download and run script that automates upgrade of prerequisite software: made after support
period has expired.
Make sure that
your support has
not expired before
wget you start updating.
https://www.netvizura.com/files/updates/ne 3. It is not possible to
tvizura-4.4.0-update-prerequisites-debian. update NetVizura
on free trial. If you
sh --output-document=/tmp/update-prerequis want to extend
ites-debian.sh your assessment
for one additional
sudo month, please
bash /tmp/update-prerequisites-debian.sh request a new free
trial license.

When presented with the dialog about Tomcat configuration files being upgraded
choose answer "Keep localy installed version", which is the default. Press Enter to
proceed.

3. Download the update package (assumed filename is netvizura-x.y.z-linux.deb) t


o NetVizura server's /tmp directory and perform the update
x.y.z is NetVizura version number

dpkg -i /tmp/netvizura-x.y.z-linux.deb

4. Refresh your browser (Ctrl + F5)

5. Check if the update is successful on NetVizura's license page: http://<netvizura_server_ip


>:8080/netvizura/#settings:license

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 57


Linux CentOS Update
NetVizura requires working connection to the internet to install required update. After
update is successful you can turn off internet access for NetVizura server. 1. NetVizura might
not work properly if
updated from more
older versions. We
kindly urge you to
Step-by-step guide first successively
update it to
1. Check free space on disk with df -h command. If there is less than 8GB of free space on previous version,
disk, delete some files to make at least 8GB available space on disk (easiest way is to and then to current
delete old raw data files in archive which is usually located in /var/lib/netvizura/fl version.
ow/archive) 2. NetVizura will not
2. Download the update package (assumed filename is netvizura-x.y.z-linux-rpm.t work if update is
gz) to NetVizura server's /tmp directory made after support
x.y.z is NetVizura version number. period has expired.
3. Execute cd /tmp Make sure that
your support has
4. Execute tar -xzf netvizura-x.y.z-linux-rpm.tgz not expired before
you start updating.
5. Execute ./update.sh 3. It is not possible to
update NetVizura
6. Refresh your browser (Ctrl + F5) on free trial. If you
want to extend
7. Check if the update is successful on NetVizura's license page: http://<netvizura_server_ip your assessment
>:8080/netvizura/#settings:license for one additional
month, please
request a new free
trial license.

If downloaded from Internet Explorer, the filename would be netvizura-linux-x.y.z-rpm.gz.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 58


Windows Update
NetVizura will not work if update is made after support period has expired. Make sure
that your support has not expired before you start updating

In case you have previously installed NetVizura 4.3.1 or 4.3.2 in the location other than
C:\Program Files\NetVizura we strongly recommend you to perform clean install of the
latest version. Read more.

Update from versions 4.3.3+

1. Download latest NetVizura Windows installer from NetVizura official website


2. Run downloaded installer and follow steps
3. Refresh your browser (Ctrl + F5)

4. Check if the update is successful on NetVizura's license page: http://<netvizura_server_ip


>:8080/netvizura/#settings:license

Update from 4.3.1 and 4.3.2 to 4.3.3

1. Check free space on disk. If there is less than 8GB of free space on disk, delete some
files to make at least 8GB available (easiest way is to delete old raw data files in archive
which is usually located in C:\Program Files\NetVizura\flow\archive)
2. Download NetVizura update package from NetVizura official website
3. Unzip the package with Extract All... option from Windows context menu

4. Navigate to extracted netvizura-update folder and double-click on update.bat to run the


updater
5. Follow the installation steps
6. Refresh your browser (Ctrl + F5)

7. Check if the update is successful on NetVizura's license page: http://<netvizura_server_ip


>:8080/netvizura/#settings:license

To update from version 4.3.1 or 4.3.2 to a version newer than 4.3.3 you will first have to
perform update to version 4.3.3 using update package for versions 4.3.1 and 4.3.2
available on NetVizura website. After that you can update to any subsequent version
using Windows installer for that version.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 59


Linux Ubuntu Update
Notice

1. NetVizura might
NetVizura requires working connection to the internet to install required update. After
not work properly if
update is successful you can turn off internet access for NetVizura server.
updated from more
older versions. We
kindly urge you to
first successively
Step-by-step guide update it to
previous version,
1. Check free space on disk with df -h command. If there is less than 8GB of free space on and then to current
disk, delete some files to make at least 8GB available space on disk (easiest way is to version.
delete old raw data files in archive which is usually located in /var/lib/netvizura/fl 2. NetVizura will not
ow/archive) work if update is
2. Download and run script that automates upgrade of prerequisite software: made after support
period has expired.
Make sure that
your support has
wget not expired before
https://www.netvizura.com/files/updates/ne you start updating.
tvizura-4.4.0-update-prerequisites-ubuntu. 3. It is not possible to
update NetVizura
sh --output-document=/tmp/update-prerequis on free trial. If you
ites-ubuntu.sh want to extend
your assessment
sudo for one additional
bash /tmp/update-prerequisites-ubuntu.sh month, please
request a new free
trial license.

When presented with the dialog about Tomcat configuration files being upgraded
choose answer "Keep localy installed version", which is the default. Press Enter to
proceed.

3. Download the update package (assumed filename is netvizura-x.y.z-linux.deb) t


o NetVizura server's /tmp directory and perform the update
x.y.z is NetVizura version number

dpkg -i /tmp/netvizura-x.y.z-linux.deb

4. Refresh your browser (Ctrl + F5)

5. Check if the update is successful on NetVizura's license page: http://<netvizura_server_ip


>:8080/netvizura/#settings:license

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 60


Getting Started
This chapter covers where is what in NetVizura and initial configuration steps of NetVizura:

Initial Configuration
General Initial Configuration
NetFlow Initial Configuration
EventLog Initial Configuration
Navigation
General Navigation
Dashboard Navigation
NetFlow Navigation
EventLog Navigation
MIB Navigation

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 61


Initial Configuration
You must log in as administrator to be able to configure NetVizurar. Default username and
password are admin/admin01.

Initial configuration consists of the following steps:

General Initial Configuration


NetFlow Initial Configuration
EventLog Initial Configuration

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 62


General Initial Configuration
Changing Default Administrator Password On this page:
Changing the default administrator credentials is necessary to secure your system from
unauthorized access. Changing Default
Administrator
To change default administrator account: Password
Creating Users
1. Login as existing administrator (admin/admin01) Configuring SNMP
2. Go to > Settings > Control Panel > Users Policies
3. Select administrator account and click Edit Enabling Email
4. Change the password Notifications
5. Add email and other user information
6. Click Save.

You can also add more admin accounts and delete the default one. To see more details about
managing your account, see My Account. To learn more about managing users, go to Managing Tip
Users.
Adding email to an admin
account will ensure that the
admin gets critical system
messages such as license
messages, low disk space
etc.

Creating Users
To enable multiple users to access NetVizura, you need to create user accounts.

To add a new user:

1. Click +Add Adding email to an account


2. Insert user's Login and Contact Information into appropriate fields. will allow the user to be
added as a recipient of
First name, Last name, Username and Password are mandatory fields. email alarms in NetVizura
modules.
3. Choose the Permissions from the drop-down lists
4. Click Save.

For more details on managing users, go to Managing Users page.

Configuring SNMP Policies


After configuring your devices and installing NetVizura you should:

1. Add policies (SNMP configuration) for accessing your devices.


This allows getting useful information from your devices like its name and its interface
names. For more information on policies and how to add them, go to article Configuring
SNMP Policies.
2. Add policies to your network devices and check if policies are working.
For more information on devices and policy testing, go to article Configuring Devices.

Enabling Email Notifications


Set NetVizura email account to get notifications like system alarms, license info and module
alarms.
This will allow you to get notifications like system alarms, license info and module alarms. For more
information, go to article Configuring E-Mail.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 63


NetFlow Initial Configuration
Setting NetFlow Collection Port On this page:
When you start the NetFlow Analyzer for the first time, you need to set NetFlow collection port
before you can see traffic. Setting NetFlow
Collection Port
NetFlow collection port is a port on NetVizura server listening for NetFlow traffic exported Checking the
by network devices. You need to set exporting port number on all your network devices to match System
NetFlow collection port. Default port number is 2055. Setting End User
Traffic (Optionally)
To set the NetFlow collection port:

1. Go to > Settings > NetFlow Settings > Configuration tab


2. Type a new value in Collection port field
3. Click Save.

Checking the System


Now is a good time to check if the system is working properly.

To do so, follow these steps:

1. Check if the Collection port is set properly


To see the Collection port number, go to > Settings > NetFlow Settings >
Configuration tab, and you will find the Service socket port field. Collection port number To learn more about
must match with the port number your network devices are exporting the netflow data to. system settings in general,
go to chapter Configuring
2. Make sure NetFlow data is collected NetFlow System.
Go to TopN > System tab. Packets tab shows if netflow UDP packets are received and
Flows chart shows how many flows have been exported to NetVizura server

3. Check the system for warnings or errors.


Click on the Show log arrow (in the bottom right corner). Any warnings or errors will be All other settings you do
displayed as well as the instruction to resolve them. not need to set right away.
However, you should get
back to them once you get
4. Finally, check if the network traffic is available to know NetFlow Analyzer
Go to TopN > All Exporters tab. Network traffic should be shown on the graphs, this is a little better and fine-tune
a verification that the network traffic data has been collected by the NetFlow Collector and the behaviour of your
that the data has been processed by NetFlow Aggregator. system.

Note that it may take up to 10 minutes to see traffic from a new exporter. This is the time
needed for the application to create the finest sample of traffic since one sample lasts 5 minutes
and two samples are needed to draw a line on the chart.

Setting End User Traffic (Optionally)


In addition to general network traffic (Exporters, Traffic Patterns and Subnets Sets), you can view
traffic made by organization end users (domain usernames).

To setup this traffic:

1. Check if the Collection port is set properly


To see the Collection port number, go to >Settings > NetFlow Settings >
Configuration tab, and you will find the Service socket port field. End users collection port
number must match with the port number your Syslog agent is exporting the logon syslog
messages to.
Specifying too broad
2. Update existing or add new End User mapping rule subnet in the Source IP fiel
d might result in

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 64


2.

If you use Snare as your Syslog agent, then you can use one of the provided mapping performance penalty. For
rules. In this case, just update Source IP field, verify if rule is matching users and change best results consider
changing Source IP to
status to Active. To do so, go to > Settings > NetFlow Settings > End Users. more specific value or
concrete IP address.
If rule for your Syslog agent is not provided with NetVizura by default, you should create
your own rule in order to successfully map users (link username with an IP address at
specific time). Read more about how to setup custom End User mapping rule in the the
article Configuring End Users.

3. Finally, check if the network traffic is available


Go to TopN > End Users tab. Network traffic should be shown on the graphs, this is
a verification that the network traffic data has been collected by the NetFlow Collector and
that the data has been processed by NetFlow Aggregator.

Note that it may take up to 10 minutes to see traffic for a new user. This is the time needed for
the application to create the finest sample of traffic since the sample lasts 5 minutes and two
samples are needed to draw a line on the chart.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 65


EventLog Initial Configuration
After configuring your devices and installing NetVizura EventLog you should verify that:

1. Devices are exporting syslog and trap messages to the same port that NetVizura
EventLog is listening to.

2. Messages are passing the network firewall and reaching the NetVizura Server

3. NetVizura Server Ports to which syslog and trap messages are sent is open

By default, syslog messages are exported from the devices to port 514, while NetVizura listens on
the port 33514 in Linux systems and on the port 514 in Windows systems. If you use Linux
systems, you need to (1) redirect syslog messages to the 33514 on NetVizura server, (2) export
syslog messages to 33514 from device, or (3) change NetVizura EventLog configuration. Same
applies to trap socket port.

On Linux systems ports lower than 1024 can not be used by application, unless the root
privileges are given to NetVizura EventLog.

To change NetVizura EventLog configuration go to > Settings > EventLog Settings >
Configuration and under Service options change the Socket port values.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 66


Navigation
This chapter covers navigation in NetVizura its modules. In order to get familiar with what is where
in NetVizura, be sure to check the following:

General Navigation
Dashboard Navigation
NetFlow Navigation
EventLog Navigation
MIB Navigation

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 67


General Navigation
This chapter explains the basic navigation in NetVizura to allow you to more quickly learn where is
what in NetVizura. On this page:

NetVizura interface can be roughly separated in two:


Top Navigation
Top navigation bar Bar
Main Panel. Module Menu
Settings Menu
Top level Navigation bar is always displayed independent to the Main Panel data. Main Panel Settings
shows dashboard and module specific data in view mode or Settings Panel in settings mode. Navigation
About
information
Top Navigation Bar Time Window
Menu
All pages within NetVizura show a navigation bar spanning across the top of the screen.

The Top navigation bar consists of the following options from left to right:

1. Module Menu - shows available modules and active module (highlighted in blue).
2. User Menu - shows current user and allows access to Log-out and My Account options.
3. Settings Menu - link to Settings, Getting Started wizard, website Homepage and About
information.
4. Time Window Menu - sets time window for which data will be displayed in a module.

Module Menu

Module Menu shows all modules available to the logged in user. You can set which modules will
be seen by each user in > Settings > Control Panel > Users. (Read more in User Settings).

To choose a module simply click on the module name. Active module will be highlighted in blue.

User Menu
User Menu shows currently logged in user
(username and user type) and allows
access to options Log Out and My Account.
To Log-out or get to My Account simply
hover over User Menu and choose the
desired option.

Use My Account to manage your account


information and change your password.

To manage your NetVizura account:

1. Go to User Menu (in the upper right


corner, besides Settings)
2. Select My Account
3. Click Edit
4. Update your password or contact
information
5. Click Save

Note that guest users (user type guest) can not change My Account settings since it is a
shared account. For more information on user types, go to User Settings page.

Settings Menu

Settings Menu allows you to go to Settings mode, Getting Started wizard, website Homepage and
view About information.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 68


Settings Navigation

To access Settings hover over the Settings


Menu ( ) and click Settings option.

Settings is divided in two panels: Settings


Options Panel to the left and Main Settings
Panel in the centre of the screen. Settings
Panel will show specific settings depending
on the settings option selected.

Settings Options Panel shows the following


group of options:

1. Modules - settings for each


module
2. Control Panel - user, SNMP
policies, license and Email settings
3. Miscellaneous - TIme Window and
date preferences and Display
options

To configure NetVizura or its modules:

1. Choose what you want to configure by selecting it Settings Options Panel


2. Specify what exactly you want to configure by selecting a tab from Tab Panel

Note that display options depend on the user type and permissions: Control Panel is only
visible to NetVizura administrators (user type admin), module setting is only visible if the
user has permission to see the module, editing module data is only possible if user has
write privileges for the module etc.

For more information on user types, go to User Settings page.

About information

To access About hover over the Settings


Menu ( ) and click About option.

About shows:

NetVizura product information:


product name
product version
Additional information:
website link
support email
Legal information:
copyright information
list of used libraries
EULA

Time Window Menu


You can set default Time
Window and date format
Time Window is used to select a time interval for which data will be displayed. For example, if
preference. To learn how,
Time Window is set to Last Day then the active module will show only data and events that
go to Time Window
occurred during last day.
Settings.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 69


Time Window options:

1. Shortcuts –
history, previous
and next Time
Window value
2. Standard List –
predefined time
interval list: Last
Hour, Last 6
Hours, Last 12
Hours, Last
Day, Last Week,
Last Month
3. Custom Fields
– any time
interval (dates,
hours or
minutes) picker

Time Window is independent from the views and modules i.e. no matter where you navigate and
what statistics you select to view, TIme Window value will remain the same and will be applied to
the data shown (if applicable).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 70


Dashboard Navigation
Dashboard provides an overview of your network by showing Key Performance Indicators (KPIs)
side-by-side in one place.

It is divided in two main sections:

1. Active Alarms - indicating how many alarms are currently active by level (emergency,
alert, critical, etc.)
2. Dashlets - showing most important traffic nodes (all traffic, interfaces, services,
conversations, users) and most recent alarms

Continue reading about Using Dashboard.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 71


NetFlow Navigation
This chapter explains what is where in NetVizura NetFlow Analyzer module.
On this page:
To access NetFlow Analyzer module, click NetFlow on the Module Menu in the Top navigation bar.

When NetFlow module is selected the Flow main screen will show, as shown on the picture below. NetFlow Analyzer
Note that data displayed will be according to Time Window value: if Time Window is set to Last User Interface
Day, charts and tables will show netflow traffic that occurred in the last 24h. Navigating TopN
Navigating Raw
Data

NetFlow Analyzer User Interface

First let us define main parts of the NetFlow Analyzer user interface:

1. Mode Panel – choose between the TopN and Raw Data mode
Only users with NetFlow write module permission can see Raw Data mode

2. Menu Panel – shows options available in the selected mode


3. Tab Panel - shows additional options depending on selected mode and menu option (and
selected node)
4. Main Panel – shows network traffic charts and tables for the set Time Window

To make navigation easier for you, several indicators (blue or white highlights) show where you are
and what you are doing – which mode, option, graph, etc. you are currently using or setting. On the
figure above you can see that the selected Mode is TopN, selected Menu option is Exporter (San
Francisco is the active node), and that selected Tab options is Interface - this results in Main Panel
showing the TopN interfaces for exporter San Francisco.

Navigating TopN

To access TopN choose TopN in the Menu mode.

Main parts of the NetFlow TopN interface are:

1. Time Window - sets the time window for TopN traffic

2. Menu Panel shows:

1. Exporters and Interfaces Node tree

2. Traffic Patterns and subnets Node tree

3. Traffic Patterns and Subnet Sets Node tree

4. Favorite nodes

5. System traffic types

6.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 72


6. Details for selected node in the Node Tree.

3. Selected node - active node for which the traffic is displayed in the Main Panel

4. Traffic distribution (Tab Panel) – traffic distribution by subnets (Traffic Pattern view only),
interfaces (Exporter view only), hosts, conversations, services, protocols, QoS and AS

5. Chart and table (Main Panel) – traffic values for the selected node by selected distribution
during time set in Time Window

6. Side Panel – two small charts showing (bits, packets or flow traffic), PDF reports and
refresh options

In Figure above you can see TopN host (4) for Traffic Pattern All Traffic (3) during last 6 hours (1).
You can also see that the top host is 172.16.1.41.

To navigate to a desired TopN traffic:

1. Set Time Window


2. Select TopN in the Mode Panel
3. Select an option from the Menu Panel (Exporters, Traffic Patterns, Subnet Sets or
Favorites)
4. Select the desired node (Exporter, Interface, Traffic Pattern, Subnet Set or Subnet) from
the Node Tree
5. Select the desired traffic distribution (Overview, Interface, Subnet, Host, Conversation,
Service, Protocol, QoS or AS) from the Tab Panel

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 73


Continue reading about Traffic Distributions (Top Talkers).

Navigating Raw Data

By selecting the Raw Data menu option, you will be able to inspect raw data files in the Main panel.

You can also notice the Raw Data Tree right under the Raw Data menu option. Raw Data Tree
groups raw data files in folders according to day/hour/minute. Note that Raw Data Tree will show
raw data files for the specified time period set in Time Window.

There are 3 ways of inspecting raw data files:

1. Select check boxes next to files you want to inspect and click Show Selected

2. Select a single file in the Raw Data Tree and click Show Selected

3. Click on a single file to inspect it

To navigate and view Raw Data from specific files:

1. Select a date/time folder from the Node Tree


2. Select desired Raw Data files from File Table

Raw Data includes vast quantity of information about each single flow. Unpacking
many files would require significant processing power and memory space, and therefore it
is suggested to select and view only a few files at a time.

3. Click Show Selected

By clicking on the Show selected, Raw Data Table will open showing the information from selected
raw data files.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 74


For easier navigation according to your interest you can further filter, group and sort Raw Data
Table records by certain fields.

Continue reading about Inspecting Raw Data (Flow Records).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 75


EventLog Navigation
EventLog User interface

When EventLog module is selected main screen will show the following parts:

1. Mode Panel - choose between the Syslog and SNMP Trap mode.
2. Main Panel - displays results of SNMP request and MIB search operations.

For the purpose of this chapter, we will focus on the navigation in the Syslog mode.

Navigating in Syslog mode

To view syslog go to EventLog module and click Syslog tab. Here you can see syslog
messages sent from different exporters for a chosen Time Window. On this page:

1. Show Options
2. EventLog Chart Show Options
3. Severity Table Syslog Chart
4. Exporter Table Severity Table
5. EventLog Table Exporter Table
Syslog Table
Table and charts will show logs that have (1) the same severity as set in Severity Table (2) for
the time set in Time Window. For these logs Exporter table will show distribution by exporters
and Severity Table will show distribution by log's severity.

For example, on the screenshot to the left, you can see that logs that occurred during the
selected Time Window and severity 0 to 5 are shown. You can also see that there was 523,918
such logs (Severity Table) of which most numerous were Warnings (55%) and Errors (29%).

You can also see the distribution of these logs by exporters in the Exporter table: exporter
x.x.6.201 generated the most logs (139,130).

Show Options

Show Options:

1. Refresh Data – manually refresh


data on charts and tables
2. Clear filters – clear all filters
3. Show Exporter Names – show
names of exporters (routers)
instead of their IP address

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 76


Syslog Chart

EventLog Chart shows distribution of syslog messages (logs) by severity:

1. Logs per bar (y-axis)


2. Time axis (x-axis)
3. Bar width
4. Zoom out

Chart shows number of logs in certain time chunks (1 minute, 1 day, 1 hour). Width of the chart
bars and number of bars depends on the Time Window selected. See table below:

Time Window Bar Width Number of Bars

Last hour 30 seconds 120

Last 6 hours 5 minutes 72

Last 12 hours 5 minutes 144

Last day 15 minutes 96

Last week 1 hour 168

Last month 6 hours 120

Chart has two axis: numerical y-axis and time x-axis. Numerical axis shows the number of logs
per bar. Time shown on the x-axis of the chart is the same time as set in the Time Window.
Next to the Syslog Chart is the Severity Table in which you can select if syslog messages of the
certain severity will be displayed on the chart or not. Colors on the chart correspond with the
colors of the syslog Severity in the Severity Table.

On the EventLog Chart above you can see that one bar on the chart represents logs during 30
seconds (bar = 30 seconds).

Severity Table

Severity Table shows log distribution by severity, for the logs of


selected severity that occurred in the selected Time Window. On
screenshot to the right currently selected severity levels are 0, 1, 2
and 3. This means that Syslog chart and tables will show only logs
with this severity levels. By clicking on the corresponding severity
in the Severity Table you can switch on/off logs of that severity.
Switched off severity is shown with a gray background and logs
with that severity are not shown on the carts and graphs.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 77


Exporter Table

Exporter Table shows log distribution by


exporter, for the logs of selected severity
that occurred in the selected Time
Window. Top 7 exporters have a color
assigned, while other exporters are grey
and under Others on the pie chart. To see
other exporters, scroll down the exporter
list. Clicking on an exporter will show only
logs for that exporter on the charts and
table. By clicking on it again, you can
switch back to seeing logs for all
exporters.

Syslog Table

EventLog Table shows messages with selected severity (in Severity Table) that were received
during time set in the Time Window. For each message Date, Exporter, Severity, Facility and
Message content is displayed. Severity levels are shown with the corresponding color, as in the
chart and Severity Table. 9/19 Figure 7: Exporter Table Figure 6: Severity Table Syslog Table
can be filtered by Exporter, Severity, Facility and Message content. Note that the filters can be
activated by selecting items in the Severity and Exporter Tables, as described above. To clear
all filters, click the Clear button above the Syslog chart. To show exporter DNS names, click the
Show Names button above the Syslog chart.

Continue reading about Inspecting Syslogs.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 78


MIB Navigation
When MIB module is selected the MIB main screen will show the following parts:
On this page:
1. Mode Panel - choose between the MIB and Device mode.
2. Menu Panel - shows options available in the selected mode
Navigating in MIB
3. Tab Panel - tab contains the information on the OID requested and the device the SNMP
Mode
Query was sent to. For each SNMP request a new tab will open.
Navigating in
4. Main Panel - displays results of SNMP request and MIB search operations.
Device Mode

On the screenshot above, you can see that MIB ifTable is selected in the MIB tree and that after
SNMP request the Main Panel shows the ifTable with OID values for the currently selected device
(cisco3550-xxx). In the Details it is visible that the ifTable OID is .1.3.6.1.2.1.2.2.

Navigating in MIB Mode

MIB Browser is selected by default and it


shows the MIB tree with its options for
SNMP request and OID search.

MIB browser options:

1. MIB Tree – shows the MIB Tree


and corresponding options:
a) searching the MIB tree for
particular OID
b) request a SNMP Query for
particular MIB on the Current
device
2. Favorites – shows all user favorite
OIDs (added from the MIB Tree)
3. Details – shows OID details
(name, description etc.) for the
selected node in the MIB tree

Navigating in Device Mode

Device mode is used to set the Current


device. Any SNMP request in the MIB tab
will be sent to the Current device.

Device mode is available only if NMS module is included in NetVizura application.

On screenshot to the left you can see that


the Current device is cisco-xyz. When you
click on the Request in the MIB tab, SNMP
Query command will be sent to this device.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 79


Device Tab includes following options and
information:

1. Add instant device


2. Current device
3. List of devices in the application
database
4. List of instant devices

Devices added in the > Settings > MIB Settings > Devices will show in the list of
devices and will be always available.

Instant devices are user added devices that will not be saved in the database (the list will
be cleared after logout). Instant devised are used if you want to quickly check an OID on
a device but do not want the device to be stored for later use.

Continue reading about Searching OIDs.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 80


Using NetVizura
This chapter shows how to use NetVizura and its modules:

Using Dashboard
Using NetFlow
Basic NetFlow Usage
Advanced NetFlow Usage
Using EventLog
Viewing Syslog Messages
Inspecting Syslogs
Viewing SNMP Traps
Understanding Eventlog System Traffic
Using EventLog Alarms
Syslog How to...
Using MIB
Searching OIDs
Setting Current Device
Making SNMP Request
Managing MIB Favorites
Reading MIB Details

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 81


Using Dashboard
Convenient place to start using NetVizura in your everyday activities is the Dashboard. It is an eas
y to look, one page overview of your network state. On this page:

Active Alarms
Top Interfaces
All Traffic
Top Subnet Sets
NetVizura Dashboard includes the following widgets: Top Services
Top Conversations
1. Active Alarms Top End Users
2. Top Interfaces
3. All Traffic Overview
4. Top Subnet Sets
5. Top Services
6. Top Conversations You might want to display
7. Top End Users this Dashboard on the large
wall screen in your office.
Everyone in the team
Most of the widgets require correct setup of All Traffic Pattern. Read more how to check
would be able to spot
and modify All Traffic Pattern.
immediately a new alarm or
when atypical network
traffic occurs, and in this
way improve visibility,
collaboration and incidence
response time.

Active Alarms
Here you are able to check how many alarms are currently active in your network.

Alarms are presented in real-time, in a donut chart so that you can get an overview about their
proportion, as well as in their own cards for you to quickly determine distribution of alarms by
severity.

Above screenshot shows 63 currently active alarms, where 24 of them belongs to emergency
level, 1 to error, 12 to notice and 26 to debug.

Clicking on the alarm level in the chart or on the card leads to Alarm module where you can see
more details and actions.

Read more about Using NetFlow Alarms.

Top Interfaces
With Top Interfaces widget you are able to determine which interfaces "eat" most of the bandwidth
in your network. This may help you to better organize/balance your network or to influence budget
plan for improvements in your network infrastructure.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 82


Clicking on the chart leads to the All Interface view in NetFlow module, and click on the particular
interface in the legend leads to its detailed analysis.

Read more about Interface Traffic.

All Traffic
In All Traffic widget you are able to see total traffic in your network (from all exporters, in all
subnets, including internal and external network). It shows three charts - bits/s, packets/s, flows/s
so that you can compare them in relation to one another. This enables you to immediately spot if
there are any irregularities impacting your entire network (for example, normal bits/s and packets/s
charts with increased flows/s chart suggest some kind of network attack).

Clicking on the particular chart or unit in the legend leads to the dedicated chart in the NetFlow
module where you can further investigate your network behavior and identify potential causes for
concern.

Read more about All Traffic Pattern.

Top Subnet Sets


Subnet Sets widget shows top subnets in your network. To understand how Subnet Sets works,
Read more about Subnet Sets. To run Subnet Sets widget within the dashboard you have to
configure at least one subnet set.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 83


Clicking on the Subnet Sets chart leads to All Traffic Pattern > Subnet Set distribution, while click
on the specific Subnet Set in the legend leads to its detailed analysis.

Read more about Traffic Pattern in Subnet Sets.

Top Services
Here you can see which services are most common in your network. This helps network
administrators to better control traffic which passes through the network.

Clicking on the chart leads to All Traffic > Services distribution, and clicking on the specific services
additionally highlights it.

Read more about Distribution by Services.

Top Conversations
This widget provides glimpse on the conversations most involved in your network traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 84


Clicking on the legend (Upload/Download) will lead you to the All Traffic > Conversation
distribution, while clicking on the service in the legend will additionally highlight it.

Read more about Distribution by Conversations.

Top End Users


In order to view End Users traffic, you have to configure it first: End User Settings. Top End Users
widget enables you to determine which network users are winners in bandwidth consumption.

Clicking on the legend (Upload/Download) leads to All Users overview, whereas clicking on a
specific user goes to his/hers detailed analysis.

Read more about All Users Traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 85


Using NetFlow
Basic NetFlow Usage
Advanced NetFlow Usage

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 86


Basic NetFlow Usage
In this chapter you will find out what network traffic is available to you and how to make the best
use of it. Network traffic is available in NetFlow Analyzer module.

This chapter covers:

Traffic Distributions (Top Talkers) - how network traffic is split by categories (such as
hosts, conversations, QoS etc.).
Using Charts and Tables - how to use charts and tables showing network traffic
Exporters and Interfaces Traffic - how to view traffic for exporters and their interfaces
Basic Traffic Patterns - how to start analyzing logical structures of network traffic,
independent of the physical infrastructure.
Subnet Sets - how to analyze statistics for group of Subnets (IP ranges) or smaller
Subnet Sets.
Favorites - how to manage frequently monitored nodes.
Details - how to view additional information for a selected node.
Reports - how to export traffic to PDF file or schedule a report.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 87


Using Charts and Tables
Traffic is represented in several visual manners in order to provide you quick insight in the traffic
structure: On this page:

Throughput Chart (area and bar time chart) - time diagram, which represents one or
Throughput Chart
more parameters within the selected time frame allowing you to follow changes in traffic
View Options
and recognize traffic trends with ease.
Zooming
Volume Chart
Volume Chart (pie chart) - distribution of Top N bandwidth consumers in a pie chart form,
Table
allowing you to easily visualize and compare bandwidth consumers with each other.
IP Address
Resolution
Table (text table) - in addition, Throughput and Volume charts are followed below by a
Additional Options
corresponding top-talker table. Top-talker table shows entities most contributing to the
Set Metrics
traffic showed on Throughput and Volume charts.
Side Charts
Top Talker
Isolation
Charts and tables are network element and time specific. In other words, each chart and table
Top Talker
shows traffic for a selected node in the Navigation tree for the given TIme Window.
Drill-Down
Top Talker
Highlight

Throughput Chart

Throughput is a time chart enabling you to see large number of parameters in an arbitrary time
interval (set by Time Window). This is particularly suitable for viewing changes in the traffic over
time, spotting traffic trends and anomalies:

On the graph, positive part of the y-axis shows outbound (Out) traffic, while negative part of the
y-axis shows inbound (In) traffic. Out traffic is traffic originated from the internal network to
external network, while In traffic is traffic destined to the internal network from external network.

The Top-talker table below will show average and maximum values for In and Out traffic
achieved during the given time interval, as well as Total traffic in the selected
measurement unit (bps, pps, fps) and as percentage of total traffic for each table entry.

View Options

Throughput chart can be seen as area or bar chart. Area chart enables you to see the flow of traffic
more smoothly, while bar chart gives you the ability to view traffic by each sample. Use the area
chart for spotting trends and over-viewing the traffic of large time intervals. Use the bar chart when
solving problems and when you need more details on the sample level (time interval you are
inspecting is relatively small).

To switch between the area and bar chart click the Area chart or Bar chart button. This will give
you a chart as shown in screenshot below. Re-selecting the option will give you the original view
back.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 88


Zooming

You can zoom in and out of the Throughput chart. This enables you to quickly and more directly
select the time window you are interested in (in comparison to the time Time Window).

To zoom in:

1. Move the cursor over the chart (cursor will turn from arrow to hand).
2. Position the mouse to the beginning of the time interval you are interested in.
3. Press and hold the left mouse button.
4. Drag the cursor to the end of the time interval you are interested in
5. Release mouse button

Chart and table are now showing the traffic for the interval you have just set.
To zoom out, simply click
on the zoom out icon in the
right-hand corner of the
Throughput bar. This will
set the previous time
interval as active time
interval.

TIme Window is in sync with zoom in and out meaning that zooming will set a new Time
Window value. The Top-talker table is adjusted to show traffic for the zoom time interval.
Zooming in also activates the zoom out icon (beside area or bar chart icon).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 89


Volume Chart

Volume is a pie chart enabling you to easily visualize top-talkers in regard to total traffic and
each other, for the given Time Window.

There are two charts, for inbound (In) and outbound (Out) traffic.

Top-talker table will show total traffic volume values if Volume chart option is active. It
will show values in the selected measurement unit (bytes, packets, flows) and as
percentage of the total traffic for each table entry.

Table

Text table shows average, maximum and total values for top-talker contributes. Additional
columns, such as In, Out, Src or Dst, will show if applicable.

To change the number of


top-talkers shown in the
charts and tables, read
more about TopN Settings.

Table can be sorted by any column in decreasing or increasing order. Selecting the column again
will switch between decreasing, increasing and no ordering. Table also shows if there were any
alarms during the selected Time Window for all top-talkers.

"Others" entry in the charts and table (in gray) represents traffic not belonging
to top-talkers. Only exception to this is the display of Subnets where “Others” entry
represents all values that are matched to a traffic but not matched with any defined
subnet for that traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 90


IP Address Resolution

In order to enable IP address resolution, your NetVizura server should have local or
remote communication with DNS server (for Hostname) and Internet access (for Whois
information).

To completely understand host, conversation and AS traffic it is necessary to have background


knowledge about the host IP addresses that participated. However, this may prove time consuming
and network admins often don't have time to browse manually for this information online.

For this reason, NetVizura provides IP address resolution (Hostname, Geo-location and Whois
information) that significantly saves time, improves readability of the statistics and increases
overall contextual awareness.

As you can see in the screenshot above, this end user had two bigger downloads at around 16h
from two IP Addresses belonging organization Akamai Technologies, located in United States.

Additional Options

Set Metrics

As a measurement unit for the observed traffic, the charts and table can show:

Bits - bits per second (bits/s, bps)


Packets - packets per second (packet/s, pps) and
Flows - flows per second (flow/s, fps)

Side Charts

To the right of the main chart with selected measurement, you can see also two other
measurements:

A typical attack example is

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 91


when you notice that
a great number of flows or
This view helps you to quickly compare the number of flows and/or packets with their size in bytes, small packets have
enabling you to recognize attacks. occurred in a short amount
of time.
Top Talker Isolation

You can isolate contribution of any top talker by clicking on the top talker name in the table. This
will reload the chart to show the contribution of the selected top talker only.

In the example above you can see top conversations. If you click on the second conversation
A.B.1.44 => C.D.13.230 : HTTP : TCP, chart will reload to show the selected conversation traffic
only (screenshot below).

To cancel the top talker isolation, click on the top talker name again.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 92


Top Talker Drill-Down

If a top talker is an exporter, interface, Subnet or Subnet Set, clicking on the its name will result in
the jump to that top talker in the Node Tree rather then the top talker isolation. The jump occurs
because more detailed traffic for that top talker is available by jumping to its node then by simply
isolating it on the chart.

In the example above (first screenshot) you can see top interfaces of an exporter. If you click on
the first interface Vl9, you will jump to that interface to view its traffic in more details (second
screenshot above).

Top Talker Highlight

To highlight a top talker on the chart or table, simply click on it in the chart or on its table cell in the
table. Chart field and table row will become highlighted:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 93


This can be very useful if colors on the chart are similar.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 94


Traffic Distributions (Top Talkers)
Traffic can be viewed by several types of nodes: (1) Exporters and their Interfaces, (2) Traffic
Patterns and their Subnets, (3) Subnet Sets and their Subnets and (4) End Users. For each of
these nodes there a several traffic distributions that will show top talkers:

Distribution by Interfaces
Distribution by Hosts
Distribution by Conversations
Distribution by Services
Distribution by Protocols
Distribution by QoS
Distribution by AS

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 95


Distribution by Interfaces
Distribution of traffic by interfaces is available for Exporter node only. It shows how network traffic
that passed through the selected exporter is distributed to its interfaces and which interfaces are
top bandwidth consumers. This is useful if you want to look into how much exporter traffic has
passed through specific interface (in total, In and Out directions).

To view exporter traffic distribution by interface:

1. Select an exporter from Navigation Tree in the Menu Panel


2. Select Interface tab in Tab Panel

The Menu Panel Navigation Tree presents interfaces belonging to the selected exporter. Main
Panel shows throughput or volume chart and table statistics for bits, packets or flows for the
selected Time Window. Note that top talkers for bits, packets and flows can differ (e.g. a top talker
by flows may not be a top talker by bits).

Screenshot above gives an example of exporter traffic distribution by interface for the exporter
named New York Core router. From six interfaces of the New York Core router, the top talkers by
bits are: New Orleans, Miami and Boston interfaces. You can also see that more than 90% of all
traffic passing through the New York Core router passes through these three interfaces.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 96


Distribution by Hosts
Distribution by hosts shows the contribution of top hosts (individual IP addresses) to the specified
traffic. It presents the traffic activity for both internal and external IP addresses.

To view traffic distribution by hosts:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Host from the Tab panel

The number of top hosts is


configurable. To change
the number of top hosts
showing in the chart and
table, see Configuring
TopN Rules.

In order to enable IP
address resolution, your
NetVizura server should
have local or remote comm
unication with DNS server
(for Hostname) and Internet
access (for Whois
information).

The screenshot above indicates that over 90% of outgoing traffic came from first and third host in
the table.

Besides that, if you move your mouse over some host, you can see Whois information that
significantly saves time, improves readability of the statistics and increases overall contextual
awareness.

Host is in its essence an IP address. Host can be employee computer and


server. One employee can use multiple IP addresses, but also more employees
can use the same IP address.
You can expect top talkers to be proxy servers within your company network,
since they provide the access to the internet.
Also, since the number of hosts on the company level can be quite big, you can
expect a considerable amount of traffic grouped as "others" entry because most
of computers in your network will have very small amount of traffic in
comparison to proxy servers.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 97


Distribution by Conversations
Distribution by conversation shows who is talking with whom (end to end), i.e. which conversation
is consuming most of the bandwidth, information valuable for further network optimization.

To see top conversations:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node (Exporter, Interface, Traffic Pattern, Subnet Set, Subnet or End User)
from the Node Tree
3. Choose Conversation from the Tab panel

In/Out definition depends


on the selected node. For
interface traffic In traffic
corresponds to traffic that
entered the exporter
through that interface. For
Traffic Patterns In traffic
corresponds to the traffic
destined to Internal
Network in Traffic Pattern
definition.

For more info, see:

Exporter Traffic
Interface Traffic
Viewing Traffic
Patterns
Viewing Subnet
Set Traffic
Subnet Traffic in
Subnet Sets

The screenshot above indicates that top conversation is between X.X.190.17 and X.X.3.38, using
HTTPS service and TCP protocol. It is also notable that the conversation consumed Max 6.7 Mbps
of Out traffic and 149.4 kbps of In traffic.

For each conversation participant, additional DNS and WHOIS lookup are performed. IP is
presented as Hostname, whereas WHOIS description is shown in a tooltip when specific
conversation is hovered. Tooltip contains information about organization name and address,
network range, additional description and more, depending on data availability. In screenshot

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 98


above, you can see that the first address relates to organization located in Germany, you can also
see network range and name of the organization. By clicking on the arrow keys in the bottom left
corner of the tooltip you can switch to info for the other address in this conversation.

Conversation consists of two hosts/IP addresses, service and protocol. Traffic


between two hosts is treated as one conversation only if same service and
protocol are used.
Lower IP address is placed first, higher is second - the order of IP addresses
does not depend on whether host is Source/Destination or in Internal/External
Network.
Service is not the same as port - one service can use more different ports. In
this case, traffic between two hosts using any port associated to a same service
is treated as one conversation.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 99


Distribution by Services
Distribution by services shows each service contribution to the specified traffic. It presents which
services are mostly used, when they were used, and if there is any use of forbidden services (such
as BitTorrent).

To view traffic distribution by services:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Service from the Tab panel

The screenshot above indicates that on Melburn interface belonging to Beijing Core Router top
services consumed are MS-SQL, misrosoft-ds, HTTP-Proxy and netbios-ssn.

Services are applications identified by the TCP/UDP ports they use. To display
the name of a service instead of its TCP/UDP port number, it is necessary to
previously map the TCP/UDP ports with service’s names. See more at Configuri
ng Service.
In some cases, VPN traffic can be forwarded through TCP port 443 thus service
s traffic (SSH, HTTP, etc.) will be masked as HTTPS.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 100


Distribution by Protocols
Distribution by protocols shows contribution of each protocol to the specific traffic.

To view traffic distribution by protocol:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose Protocol from the Tab panel

Usually, most of traffic


(around 90%) will belong to
TCP and UDP network
protocols. If protocols other
than TCP and UDP have
considerable traffic, this
may be a sign of a security
threat. Click on the name of
the protocol in the table to
isolate it (show traffic for
that protocol only).

If you want to take a closer


look at protocols other than
TCP or UDP you can
create a Traffic Pattern
excluding TCP and UDP
protocols. For more details
on how to do this, see Fine
-tuning a Traffic Pattern.

The screenshot above indicates that on the San Francisco exporter TCP and UDP are the main
protocols. Other protocols with minor traffic are also presented.

NetVizura gives the possibility of viewing the traffic which is transferred over IP
protocols (such as TCP, UDP, ICMP, etc.). All protocols are monitored and
analyzed over a standardized protocol number used in IP packets and received
from netflows.
In order to perform the network traffic analysis in a way that best suits your
needs, you might need to define some protocols not included in NetVizura. To
learn how to define new protocols, go to Configuring Protocol

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 101


Distribution by QoS
Distribution by QoS shows specific traffic in the terms of service quality. This is interesting in
particular to companies that provide a QoS based service or use such services themselves.

To view traffic distribution by QoS:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose QoS from the Tab panel

The screenshot above indicates two main QoS used on the New York's router's St. Louis interface
- Default and CS6. It is also noted that at 12h when major increase of Default traffic occurred, CS6
traffic simultaneously experienced a significant drop.

Quality of Service is used for prioritization of critical applications and/or network


users (transferring data across the network is prioritized). You can think of
these demands as tolerance a certain application or protocol has towards the
amount of data loss (packet dropping), delay, jitter... Eg. providing low-latency
voice or streaming media, while providing simple best-effort for web traffic or file
transfers.
QoS was initially implemented via ToS and Precedence (IP Prec) 3-bit field, and
now via Differentiated Services Code Point (DSCP) 6-bit field and Explicit
Congestion Notification (ECN) 2-bit field. Read more about Configuring DSCP.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 102


Distribution by AS

NetFlow Analyzer can show the traffic between two autonomous systems. This can be
done by obtaining the information about Src AS and Dst AS from the netflow data. In
order to make this possible, the network device that is exporting netflow data (Exporter)
must have a full BGP table. This is because the network communication between
autonomous systems is done via BGP network protocol, and, therefore, information
about Src and Dst AS are known through BGP.

Distribution by AS shows specific traffic by autonomous systems. It allows comparison of the AS


traffic volume, watching trends and level of AS traffic in use (for instance, during which hours is the
traffic towards Facebook at its highest), monitoring if employees generate forbidden traffic (Google,
Facebook, YouTube, etc.).

To view traffic distribution by AS:

1. Choose a node type (Exporters, Traffic Patterns, Subnet Sets or Favorites) from the
accordion in the Menu Panel
2. Select desired node from the Node Tree
3. Choose AS from the Tab panel

Autonomous system (AS) is a network or group of networks a under unique


administrative control. Every AS has its autonomous system number (ASN),
which is globally unique. This makes an ASN an AS ID.
To learn more on how to configure Autonomous systems, see Configuring AS.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 103


Exporters and Interfaces Traffic

In order to view Exporters and Interface Traffic, you first need to configure your network
devices to send netflow data to NetVizura. After that, exporters and its interfaces will
automatically appear in the node tree as they start making traffic. Read more at Configuri
ng Network Devices for NetFlow Export.

This chapter covers viewing traffic for all exporters, single exporter and single interface; and
explains how exporter and interface name discovery works.

All Exporters Traffic


Exporter Traffic
Interface Traffic
Working with Exporters and Interfaces

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 104


All Exporters Traffic
All Exporters view shows top exporters and interfaces in the whole network.

To select this view, go to TopN > Exporters option and select All Exporters node.

The Navigation Tree in the Menu Panel shows exporters with their belonging interfaces, and Main
Panel shows top exporters or interfaces (throughput or volume, in bits, packets or flows). Exporter
tab will show which exporters have the most traffic passing through them, while Interface tab will
show you which interfaces have the most traffic passing through them in your network.

Figure above shows an example of top exporters traffic. You can see that out of four exporters
(Beijing, New York, Paris and San Francisco Core Routers) exporter New York Core router has by
far the most traffic in flows passing through it.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 105


Exporter Traffic
Exporter view shows traffic of the specific exporter in your network.

To see traffic for an exporter, go to TopN > Exporter option and select the desired exporter node.

The Navigation Tree in the Menu Panel shows interfaces of the selected exporter, while Main
Panel shows traffic for for the selected exporter (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Hosts tab will give you top hosts for the selected exporter).

Figure above shows traffic of the New York Core Router by hosts. You can see that top three hosts
that generated traffic via that exporter are X.X.51.7, X.X.198.10 and X.X.1.41, where X.X.51.7 is
also the top Source while X.X.1.41 is the top Destination host.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 106


Interface Traffic
Interface view shows traffic of the specific interface in your network.

To see traffic for an interface, go to TopN > Exporter option, select the desired exporter and then
the desired interface node.

The Navigation Tree in the Menu Panel shows interfaces of the selected exporter, while Main
Panel shows traffic for for the selected interface (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Service tab will give you top services for the selected interface).

Figure above shows service traffic for the interface Miami. You can see that HTTP and HTTP
Proxy services were mainly used via that interface.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 107


Working with Exporters and Interfaces
Exporters and Interfaces Discovery On this page:

In order to complete exporter names discovery, it is required to have basic network Exporters and
administration knowledge and access to network devices. Interfaces
Discovery
Also, you need administrator privileges for setting up SNMP policies in NetVizura Control Exporters Removal
Panel.

First time when NetFlow Analyzer receives and processes netflow packets from a network
device, it is automatically added to Exporters tree. Device initially appears as IP address (configure
d for NetFlow export), and its interfaces appear with dedicated SNMP indexes.

However, to further discover exporter and


interface names you will need to set up To learn how to configure SNMP
SNMP policies: policies in NetVizura, see SNMP
Policy Settings.
1. Enable and set SNMP on your
exporters
2. Make sure that NetVizura can send
SNMP requests to the exporters You can test SNMP configuration
3. Add SNMP policies to NetVizura ( on your devices from NetVizura
shell by using command:
> Settings > Control Panel >
SNMP Policies).
[root@NetVizura ~]#
snmpwalk -v <SNMP
After that, name discovering process is very
VERSION> -c <SNMP
easy:
COMMUNITY> <IP ADDRESS>
1. Go to Top N > Exporters tree
Example: [root@NetVizura
2. Right click on exporter or interface
~]# snmpwalk -v 2c -c
node
public 192.168.2.101
3. Select Discover

Exporter or interface name will be set to


sysName, while description (in tooltip) will
be set to sysDescr value received via
SNMP request.

After discovery, additional information about the selected exporter or interface is


available in the Details panel (Read more in chapter Reading NetFlow Details).

Exporters Removal

You need to have administrator privileges in order to confirm exporter removal.

During the course of work, you might have old exporters that no longer send NetFlow data but are
still available in the tree. For this reason, you might want to clean them up. To remove an exporter:

1. Go to Top N > Exporters tree


2. Right click on exporter node If exporter continues sending
3. Select Remove NetFlow to NetVizura from a new
4. Confirm your administrator interface, it will reappear in the
password tree so make sure to stop
5. Click OK NetFlow export on the exporter
before its removal.

Exporter will no longer be shown in the Exporter tree.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 108


Traffic Patterns

In order to view Traffic Patterns, you first need to setup Traffic Patterns of your interest.
After that, they will automatically appear in the node tree. Check out Traffic Pattern
Settings.

This chapter introduces the concept of Traffic Patterns, viewing traffic for a single Traffic Pattern,
viewing statistics for a single Subnet in Traffic Pattern tree, and explains what are the differences
between Exporter Traffic and Traffic Pattern.

Understanding Traffic Patterns


Viewing Traffic Patterns
Subnet Traffic in Traffic Patterns
Exporter Traffic vs Traffic Pattern
Basic Traffic Patterns

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 109


Understanding Traffic Patterns
What is a Traffic Pattern? It is a logical structure you create in order to analyze the network traffic
you are interested in. Traffic Patterns are completely independent of the physical infrastructure.
This enables you to focus on logical properties of your traffic instead focusing on physical links,
network devices and their interfaces.

Traffic Pattern is a part of the totally collected network traffic. It represents the
traffic between two networks, namely:

Internal Network - usually represents the whole or part of your internal network
(company network) from which the NetFlow data are exported and collected
External Network - can be an arbitrary network – other part of your
network (such as a network in another city, database center etc),
Internet provider's network, or the whole Internet.
The traffic between the Internal Network and External Network is always bidirectional. This means
that the Traffic Pattern will match the traffic going from the Internal Network to External Network,
and from the External Network to Internal Network. The statistics are generated for the traffic
between Internal and External Networks separately in two opposite directions, referenced from the
Internal Network perspective:

Outgoing (Out) traffic – going out of the Internal network or, in other words, traffic sourced
from the Internal Network and destined to the External Network.
Incoming (In) traffic – coming into the Internal network or, in other words, traffic sourced
from the External Network and destined to the Internal Network.

There are three types of Traffic depending on the direction of traffic in regards to you Internal
network:

Self Traffic - within one network. In other words, source and destination of the traffic are
both within a single network. Naturally, the network in question has to be within your
internal network. In this case, your internal network (or its part) is both Internal Network
and External Network.. In the case of Self Traffic, outbound traffic volume is the same as
the inbound traffic volume.

Normal Traffic - between two different networks (network IP ranges do not overlap).
Usually, one of these network is your company' network (or its part) and some external
network such as the whole Internet or some specific network like Facebook.

Custom Traffic - a combination of Self-Traffic and Normal Traffic. For example, if you
want to track the entire network communication of your PR department. This means
tracking (1) to witch part of your company network did they communicate with and (2) to
which networks outside of your company network did they communicate with. The Internal
Network is your PR department and the External Network is all networks except PR
department network.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 110


Traffic Pattern's Internal and External networks are defined by IP address ranges and ot
her parameters collected by the NetFlow and similar protocols can be used as filters to
further specify Traffic Patterns. Learn more about Configuring Traffic Patterns.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 111


Viewing Traffic Patterns
Traffic Pattern view presents a specific, customly configured traffic.

To show a Traffic Pattern, go to TopN > Traffic Patterns option and select the node of your
interest.

The Navigation Tree in the Menu Panel shows Traffic Patterns and their Subnets, while Main Panel
shows traffic data for for the selected Traffic Pattern (throughput or volume, in bits, packets or
flows) or its subnet. Clicking on any tab option will show traffic distribution by that category (e.g.
clicking on the Subnets tab will give you top Subnets for the selected Traffic Pattern).

Figure above shows Facebook Traffic. You can see that US Data Centers subnet takes the most of
Facebook Traffic, followed by US high schools and FIFA Main servers, whereas US colleges
subnet takes the least.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 112


Subnet Traffic in Traffic Patterns
Subnet view shows traffic for the specific Subnet within the specific Traffic Pattern.

To see traffic for a Subnet, go to TopN > Traffic Patterns option, select the desired Traffic Pattern
and then the desired Subnet.

The Navigation Tree in the Menu Panel shows Subnets of the selected Traffic Pattern, while Main
Panel shows traffic for for the selected Subnet (throughput or volume, in bits, packets or
flows). Clicking on any tab option will show traffic distribution by that category (e.g. clicking on the
Host tab will give you top hosts for the selected Subnet).

Figure above shows distribution of Facebook Traffic for the US colleges by host. You can see that
X.X.205.155 host was the major Facebook bandwidth consumer and that the most of the
downloads (In traffic) occurred between 9 and 10 AM.

Info

1. Subnet will be listed under a Traffic Pattern only if its IP address range is a
subset of the included IP address range in the Traffic Pattern Internal Network.
2. Keep in mind that subnet traffic depends on the parent Traffic Pattern. Same
subnet will have different traffic in different Traffic Patterns it belongs to since
the traffic matched to each Traffic Pattern is different.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 113


Exporter Traffic vs Traffic Pattern
This article helps in understanding the differences between Exporter Traffic and Traffic Pattern and
what are they used for.

Exporter Traffic Traffic Pattern

Setup provided by default requires custom setup

Based on physical infrastructure logical definition

Nodes exporters and interfaces Traffic Patterns, Subnet


Sets and Subnets

Monitors traffic on routers, L3 specific (custom defined)


switches and interfaces traffic

Analysis focus whole traffic on specific specific traffic between


physical infrastructure two networks

Level of expertise fast setup and easy to complex setup and harder
understand to understand

In general you will use:

Exporter Traffic when you are interested in monitoring the bandwidth of an interface or
exporter (whole traffic passing through the physical infrastructure)
Traffic Patterns to isolate a specific type of traffic (traffic via specific ports, protocols, AS
etc.): YouTube Traffic, certain service traffic, blocked traffic etc.
Traffic Patterns with Subnet Sets to monitor whole or specific traffic per logical unit:
company departments, regional company offices, member organisations, data centre
traffic etc.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 114


Basic Traffic Patterns
The main goals of this article are to (1) provide you with examples of Traffic Patterns and their
usage and (2) to give you an idea on how to create your own Traffic Patterns. In this article only On this page:
basic Traffic Patterns, that can be created with only IP address ranges and de-duplication filters,
will be explained. For advanced examples, see Advanced Traffic Patterns.
All Traffic Pattern
General workflow for creating new Traffic Pattern: Internet Traffic
Pattern
1. Determine the traffic of interest; Data Center Traffic
2. Determine which Traffic Pattern type to use (it will help you with populating Internal and Pattern
External Network address ranges);
3. Determine IP address ranges for Internal and External Networks;
4. Determine which filter (if any) you should use to filter traffic further, if needed.

Below are two most common examples of Traffic Patterns. Tip

Note that subnet nodes in a


All Traffic Pattern Traffic Pattern are shown
only if they are included in
All Traffic Pattern gives the answer to "How my network is communicating to the rest of the the Internal Network in the
world?". Here your company's IP address range is treated as Internal network, whereas all other Traffic Pattern definition.
(both belonging to your company and not) as External network.

By default, NetVizura provides All Traffic Pattern with predefined IPv4 address ranges (10.0.0.0/8,
172.16.0.0/12 and 192.168.0.0/16). However, if your company uses different IP address range
than predefined you need to change All Traffic Pattern. Since this is practically the traffic between
your network and everything else you should select Custom type and update Internal IP addresses
leaving External empty. In the end, you should use Exporter or Next Hop filtering to remove
eventual duplicate flows, if needed.

1. Edit All Traffic


2. Select Custom as Traffic Pattern type
3. IP Address ranges:
1. Internal: if necessary, change your company network's IP range(s) and click
Include
2. External: leave empty
4. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication

Internet Traffic Pattern

If you are interested in monitoring Internet traffic, first you need to prepare a specific Traffic Pattern
for this purpose. Since this is practically the traffic between your network and external world where
External network is negation of Internal Network) you should select Normal type which will
automatically populate part of the IP address ranges. Here your company's IP address range is
treated as Internal, whereas all other networks as External. In the end, you should use Exporter or
Next Hop filtering to remove eventual duplicate flows, if needed.

1. Create Internet Traffic


2. Select Normal (default) as Traffic Pattern type
3. IP Address ranges:
1. Internal: Add your company network's IP range(s) and click Include
2. External: your company network's range is excluded automatically (Normal Traffic
Pattern)
4. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication

Data Center Traffic Pattern

Another example of most commonly used Traffic Pattern is Data Center Traffic.This traffic occurs
between all your company and your data center, you should include you company's IP address
range and exclude your data center's IP range in Internal Network, and include you data center's
IP range in External network (here your data center is treated as "Outside" network). Since Internal
Network (company network without Data center) and External Network (Data Center) IP ranges
overlap you should use Custom type (turns off automatic IP address range population). Do not
forget Exporter or Next Hop filtering to remove duplicate flows, if needed.

1. Create Data Center Traffic


2. Select Custom as Traffic Pattern type
3. IP Address ranges:
1. Internal: add your company network's range and click Include
2. Internal: add your data center's range and click Exclude
3. External: add your data center's range and click Include
4. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 115


Subnet Sets
This chapter shows three types of traffic that are available in Subnet Sets Tree - Traffic Patterns,
Subnet Sets and Subnets, as well as comparison between Subnet Set and Subnet Traffic.

Traffic Pattern in Subnet Sets


Viewing Subnet Set Traffic
Subnet Traffic in Subnet Sets
Subnet Set vs Subnet Traffic

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 116


Traffic Pattern in Subnet Sets
Traffic Pattern node in Subnet Sets view, in contrast to normal Traffic Pattern view, shows Subnet
Set distribution instead of Subnets.

To show a Traffic Pattern for the specific Subnet Set, go to TopN > Subnet Sets option and select
the Traffic Pattern node of your interest.

The Navigation Tree in the Menu Panel shows Traffic Patterns and their Subnet Sets, while Main
Panel shows traffic data for for the selected Traffic Pattern (throughput or volume, in bits, packets
or flows), its Subnet Sets or Subnets of those Subnet Sets. Clicking on any tab option will show
traffic distribution by that category (e.g. clicking on the Subnets tab will give you top Subnet Sets
for the selected Traffic Pattern).

Figure above shows All Traffic. You can see traffic for AlphaCom and InoTech Subnet Sets (an
example of two organizations).

Info

Note that Subnets that do not belong to any Subnet Set will not show as child nodes of
their respectful Traffic Pattern in Subnet Set view. Their contribution to traffic will be
added to others category, since this view focuses on Subnet Sets instead of subnets.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 117


Viewing Subnet Set Traffic
Subnet Set view shows traffic for the specific Subnet Set in Traffic Pattern.

To show traffic for a Subnet Set, go to TopN > Subnet Sets option, select the wanted Traffic
Pattern and then the desired Subnet Set.

The Navigation Tree in the Menu Panel shows Subnet Sets (with their belonging Subnet Sets and
Subnets), while Main Panel shows traffic data for for the selected Subnet Set (throughput or
volume, in bits, packets or flows). Clicking on any tab option will show traffic distribution by that
category (e.g. clicking on the Subnets tab will give you lower-level top Subnet Sets of the selected
Subnet Set).

Figure above shows traffic for the AlphaCom. Traffic distributions shows traffic for the US, MENA
and Europe Subnet Sets that were previously defined.

Info

Keep in mind that Subnet Set traffic depends on the parent Traffic Pattern. Same Subnet
Sets will have different traffic values in different Traffic Patterns since the traffic matched
to each of them is different.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 118


Subnet Traffic in Subnet Sets
Subnet view in Subnet Sets shows traffic for the specific Subnet within the specific Subnet Set
(and its Traffic Pattern).

To see traffic for a Subnet, go to TopN > Subnet Sets option, select the desired Traffic Pattern,
Subnet Set and then the desired Subnet.

The Navigation Tree in the Menu Panel shows selected Subnet (and its belonging parent Subnet
Sets and Traffic Pattern), while Main Panel shows traffic for for the selected Subnet (throughput or
volume, in bits, packets or flows). Clicking on any tab option will show traffic distribution by that
category (e.g. clicking on the Host tab will give you top hosts for the selected Subnet).

Screenshot above shows New York office traffic that belongs to US offices and AlphaCom Subnet
Sets and All Traffic Pattern. You can see that X.X.1.41, X.X.4.25 and X.X.4.45 hosts were the
major bandwidth consumers of the New York office, i.e. that most of the traffic in the New York US
office of AlphaCom involved these three hosts.

Info

1. Subnet will be listed under a Traffic Pattern only if its IP address range is a
subset of the included IP address range in the Traffic Pattern Internal Network.
2. Keep in mind that Subnet traffic depends on the parent Traffic Pattern and
Subnet Set. Same Subnet will have different traffic values in different Traffic
Patterns and Subnet Sets it belongs to since the traffic matched to each of them
is different.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 119


Subnet Set vs Subnet Traffic
This article explains differences between Subnet Set and Subnet traffic and how to best use them.

Subnet Traffic Subnet Set Traffic

Defined as IP address range group of Subnets or other


Subnet Sets

Monitors subnet traffic organisational unit or


logical group traffic

Used for hierarchical network combining smaller


division based on IP address subnets into logical groups
independent to IP address
hierarchy

Examples 10.10.5.0/24, Voice traffic, IT


10.10.6.0/24, 172.16.5.0/24 department, US offices, etc.
etc.

Let us say that you have two networks with different IP address ranges (10.10.0.0 and
172.16.0.0), each with separate data and voice segments. All these segments are separate
Subnets. The Traffic Pattern and Subnets view will give you total traffic, traffic on each network,
and traffic on each segment. However, Traffic Patterns and Subnets cannot give total voice or total
data traffic (made by both networks combined). For that purpose, it is necessarily to create two
Subnet Sets, one with both voice Subnets, and the other with both data Subnets. Subnet Set
option will show these traffics.

In the other example, IT department might consist of employees working on computers in different
Subnets because they are in different buildings, towns or even countries. This usually means you
can not cover all of them by a single IP address range. With Subnets Sets, you simply group all
individual IT subnets into IT Subnet Set and traffic for the IT department will be available.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 120


NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 121
Managing NetFlow Favorites
Frequently monitored nodes (Exporter, Traffic Pattern, Subnet, etc.), can be added to Favorites for
quick access.

This way there is no need to search and navigate every time in order to view desired traffic.

To add a favorite:

1. Right click on a desired node from


Navigation Tree
2. Select Add to favorites

To view traffic for added favorite, simply:

1. Click on the Favorites tab


2. Select desired Favorite node from
Navigation Tree

And, to remove a favorite:

1. Go to Favorites tab
2. Right click on a desired favorite
3. Select Remove from favorites

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 122


Reading NetFlow Details

Details show additional information about


the selected node, such as Name, SNMP
Index, Address and Description (where
applicable).

To view details for a selected node, click Sh


ow details arrow in the bottom left corner in
the Top mode.

Details show current IP address


(only for exporters), as well as all
used NetFlow export IP
addresses.

SNMP policies need to be set in


order to have these details. For
more on SNMP policies and
exporter discovery see chapters
Configuring SNMP Policies and
Working with Exporters and
Interfaces.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 123


Generating Reports
Exporting Reports

Traffic Statistics can be exported to a PDF file in a form of report that can be printed and presented
to third parties.

To generate traffic statistics report, click Report > Export in the upper right corner of the Main
Panel while in Top N mode.

Figure above shows an example of a PDF report generated by NetFlow Analyzer. This report was
generated by clicking Report while node Internet Traffic (Traffic Pattern) and tab option Host was
selected.

Scheduling Email Reports

Adding Email Reports

Desired PDF report can be scheduled for


periodical delivery via email.

To schedule email report, select Report >


Schedule in the upper right corner of the
Main Panel while in TopN mode.

Here you are able to set report's:

1. Name - that will be used in the further report management in the Settings
2. To - third party recipients which will receive emails ( Recipient does not have to be
included as NetVizura user, practically meaning that any email address can be used)
3. Frequency - period when email will be delivered ( Email will be delivered on the 1st
day of each period. For weekly reports, 1st day of the week depends the server local time
configuration).
4. Message - text that will show in the body of the email.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 124


Managing Email Reports

Existing reports are further managed in >Settings > NetFlow Settings > Reports where
scheduled reports can be edited, removed or cloned.

To edit an existing report:

1. Select pen icon ( )


2. You are able to modify the following report's:
1. Report Name
2. To recipients
3. Frequency
4. Scope Only same-level nodes are possible to change for the same report. All
other report options, such as Throughput, bits, In/Out etc. are unchangeable)
5. Subject of the message
6. Message body
3. Click Save

To remove a report, select minus icon ( )

To clone a report, select copy icon ( ), and follow modification steps similar to report editing.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 125


Advanced NetFlow Usage
In this chapter you will learn how to setup NetVizura to show advanced traffic, alarms and how to
analyse flow records.

Advanced Traffic Patterns


Viewing End User Traffic
Inspecting Raw Data (Flow Records)
Using NetFlow Alarms
Understanding NetFlow System Traffic
Using Activity Log

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 126


Advanced Traffic Patterns

This article uses filtering based on netflow parameters. For more information on how to On this page:
add a specific filter, see chapter Traffic Pattern Settings and article Fine-tuning a Traffic
Pattern.
Discarded Traffic
Pattern
Internet HTTP
Traffic Pattern
Discarded Traffic Pattern Email
Traffic Pattern
Discarded Traffic is the traffic that your network devices send to the Null interface. On Cisco Facebook Traffic
routers, traffic is sent to the null interface if you have invalid routing (routing tables are not Pattern
complete) or the traffic is blocked by access lists. So, this traffic can give you information on (1) Unexpected
routing problems and (2) on blocked traffic, which is potentially an attack or an attempt of Protocols Traffic
unauthorized access to your network. Pattern

Let us see how to make a Traffic Pattern for this purpose. You are only interested in the traffic
within your network, so you should create a Self-Traffic type. This being said, you should only set
the Internal Network IP address range to your company network's whereas your company
network's range will be automatically included in the External network IP address range
(Self-Traffic). As for using filters, since you are interested in the discarded traffic (null interfaces),
you need to use the Exporter filter. Furthermore, as you are interested in discarded traffic on all
exporters, you need to include all exporters into the filter while setting the Out interface field to 0
(code for the null value).

1. Select Self-Traffic (Traffic Pattern type)


2. IP Address ranges:
1. Internal: include your company network's range
2. External: your company network's range is included automatically (Self-Traffic)
3. Filters:
1. Click on the Exporter:
2. Add Exporter IP address and set Interface Out value to 0, click Include

It is necessary to repeat this step for each exporters that are sending netflow data to
your NetFlow Analyzer.

Internet HTTP Traffic Pattern

In some cases, you might want to take a detailed look at HTTP traffic. Since this traffic is between
an outside network and your internal network, you should use the Normal Traffic Pattern type. You
need cover the traffic between your whole internal network and any other network (Internet). This
being said, you should set the Internal Network IP address range to your company network's range
- the External network IP address range will be populated automatically (Normal Traffic). As for
using the filters, since you are dealing with a web service which is recognized by its port(s), you
need to use an Service filter and enter its Service number, HTTP (80) in this example.

1. Select Normal (default Traffic Pattern type)


2. IP Address ranges:
1. Internal: include your company network's range
2. External: your company network's range is excluded automatically
3. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication
2. Service:
1. Include Source port(s) 80 / Destination port(s) empty (All)
2. Include Source port(s): empty (All) / Destination port(s) 80

It is necessary to repeat this step for each port that is used for HTTP (eg. 8080,
443, etc.).

Email Traffic Pattern

Your can use NetFlow Analyzer for dedicated monitoring of your Email traffic. You should use the
Custom Traffic Pattern type, since IP address ranges overlap. You need to cover the traffic
between your whole internal network with mail servers. This being said, you should set the Internal
Network IP address range to your company network's range, with exception of your mail server's
IP, and set the External network IP address range as your mail server's IP (in this case your email
server is treated as "Outside" network). As for using the filters, since you are interested in service
which is recognized by its port(s), you need to use an Service filter and add Service number for the
service, Email POP3 port (110) in this example.

1. Select Custom (Traffic Pattern type)


2. Address
1. Internal: include your company network's range, and exclude you mail server's IP
2.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 127


2.

2. External: include you mail server's IP


3. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication
2. Service
1. Include Source port(s): 110 / Destination: empty (All)
2. Include Source port(s): empty (All) / Destination: 110
It is necessary to repeat this step for each port used for email traffic (eg. 25,
995, ...).

Other examples of the filtering based on service are SMTP, SSH, MS-SQL Traffic, etc.

Facebook Traffic Pattern

You may want to measure the traffic between your network (or its part) and a specific web service
such as Facebook. Since this traffic is between an outside network (Facebook) and your internal
network, you should use the Normal Traffic Pattern type. You need to cover traffic between your
whole internal network and any other network. This being said, you should set the Internal Network
IP address range to your company network's range - the External network IP address range will be You can also join all major
populated automatically (Normal Traffic). As for using the filters, since you are interested in a web social network traffics in
service which is recognized by its AS, you need to use an AS filter and enter AS number for the into one Social Network
service, in this example the ASN is Facebook's ASN (32934). Traffic Pattern.
1. Select Normal (default Traffic Pattern type)
2. IP Address ranges:
1. Internal: include your company network's range
2. External: your company network's range is excluded automatically
3. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication
2. AS
1. 1. Include Source port(s): 32934 / Destination: empty (All)
2. Include Source: empty (All) / Destination: 32934

Other examples of AS filtering are YouTube, Twitter and Skype Traffic Patterns. You can also
monitor these services in a same Traffic Pattern.

It is necessary that your exporters have BGP table included, and that they are configured
to export AS numbers.

Unexpected Protocols Traffic Pattern

Some traffic important to you might be small in the terms of volume and, therefore, not easily
spotted on charts and graphs, if so - create a separate Traffic Pattern for that traffic. One example
of this is when you are interested in traffic made by protocols other then UDP and TCP. Since
these two protocols usually take up to 99% of all traffic, it will be hard to spot any other protocol on
graphs. Protocols other then TCP and UDP (we will call them unexpected protocols) might indicate
a tunneling protocol or a potential attack.

Let us see how to make a Traffic Pattern for this purpose. You need to cover the traffic between
your whole internal network and any other network - attacks are usually expected to come from the
External Network to Internal Network (your internal network), but keep in mind that your own
network security can be compromised and an attack might be launched from your network to some
other network (both Internal and External network). You will do that by choosing Custom for the
Traffic Pattern type. This being said, you should set the Internal network IP address range to your
company's network range and leave the External network IP address range empty, since you want
to cover all other networks. As for using the filters, since you are interested in protocols, you need
to use the Protocol filter and enter service port numbers for TCP and UDP which are 6 and 17.

1. Select Custom (Traffic Pattern type)


2. IP Address ranges:
1. Internal: include your company network's range
2. External: leave empty
3. Filters:
1. Exporter or Next Hop: read more about Manual Deduplication
2. Protocol
1. Exclude Protocol number(s): 6
2. Exclude Protocol number(s): 17

Other examples of Protocol filtering are dedicated ICMP, IPv6 and GRE Traffic Patterns.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 128


Viewing End User Traffic

In order to view End User Traffic, you first need to configure NetVizura to collect syslog
logon messages and map users to IP addresses. After that, end users will automatically
appear in the node tree as they logon to their workstations and start making traffic. To
learn more go to Setting End User Traffic.

End User Traffic is visible only to Admin users with Write permission on the NetFlow
module.

When you investigate atypical behavior or a threat in the network, information about IP address
often does not provide precise identification of the responsible person. Linking an address to a
username is very important because it allows administrators to determine exactly who used the IP
address at the specific time. This significantly improves situational awareness and reduces incident
response/resolution time - help desk agent can quickly call the responsible person to ask if he/she
logged on to the device, and cross-check suspicious behavior.

Traffic for one user is presented as the sum of the traffic from all IP addresses he used during a
certain time window.

End Users Traffic shows top talkers for:

All Users Traffic


Domain Users Traffic
End User Traffic by Hosts
End User Traffic by Conversations
End User Traffic by Services
End User Traffic by Protocols
End User Traffic by QoS
End User Traffic by AS

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 129


All Users Traffic
All Users View shows end-users with the most traffic in your network (from all domains).

To see this view, go to Top N > End Users option and select All Users node.

You can notice that user "Administrator" had significantly higher traffic then other users between
2pm and 3pm. Clicking on user "Administrator" will open single user's view, where you can deeply
inspect his/hers traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 130


Domain Users Traffic
Domain Users View shows end-users with the most traffic in one domain.

To see this view, go to Top N > End Users option and select certain domain within All Users node
.

You can notice that top


Figure above shows example of top end-user traffic from domain DOMAIN1 in time period of end-users are ordered by A
6-hours, ordered by Total Average traffic. vg in Total section. You can
change it by choosing any
This view helps to see how much traffic passing through a specific domain. Main Panel can show T other tab in the table (e.g.
hroughput or Volume measured in bits, packets or flows. Max in Upload section).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 131


End User Traffic by Hosts
End user traffic distribution by hosts shows the contribution of top hosts (individual IP addresses)
to the traffic made by specific end user. Data which was sent by the End user is classified as
Upload traffic, while data which was received by the end user is classified as Download traffic.

Traffic for one user is presented as the sum of the traffic from all IP addresses he used
during the certain time window.

To view this traffic:

1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired domain and username from the Node Tree
3. Choose Host from the Tab panel

In the screenshot above, we see that Administrator logged on to the network at 11:30 and had a
huge download from X.X.13.230. at 12:15.

Each host IP address is resolved to corresponding hostname over DNS, and for each non-private
IP address Whois lookup is perfomed. Data can be viewed in a tooltip, displayed when hovering
over specific host. Whois data contains information about the organization which owns the IP
subnet the host is part of, as well as the AS number, additional descriptions, country and other
location related information for that host.

To understand host traffic in general, read more at Distribution by Hosts.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 132


End User Traffic by Conversations
Distribution of end user traffic by conversation shows with whom, over what service and protocol
did the user talked to during specified time window. This is useful if you want to look into how much
traffic has been generated by end to end conversation by a certain user. Data which was sent by
the End user is classified as Upload traffic, while data which was received by the end user is
classified as Download traffic.

To see traffic by conversation for specific user:

1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose Conversation from the Tab panel

In the screenshot above you can see that the selected user mostly use mail service, since POP3
protocol consumes most of the traffic.

To understand conversation traffic in general, read more at Distribution by Conversations.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 133


End User Traffic by Services
End user traffic distribution by services shows the contribution of top services to the traffic made by
specific end user. Data which was sent by the End user is classified as Upload traffic, while data
which was received by the end user is classified as Download traffic.

To view this traffic:

1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired domain and username from the Node Tree
3. Choose Service from the Tab panel

In the screenshot above, we see that during the selected time window one user made traffic with
some undesirable services - 1.1 GB with Tuxanci game and 440 MB with Vuze BitTorrent.

To understand services traffic in general, read more at Distribution by Services.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 134


End User Traffic by Protocols
End user traffic distribution by protocol shows the contribution of top protocols to the traffic made b
y specific end user. Data which was sent by the End user is classified as Upload traffic, while data
which was received by the end user is classified as Download traffic.

To view this traffic:

1. Choose a node type End Users from the accordion in the Menu Panel
2. Select desired username from the Node Tree
3. Choose Protocol from the Tab panel

In the screenshot above, we see that this user was logged on to the network from 09:00 till 17:00,
but also from 23:30 till 00:30. He mostly made TCP downloads but also made one larger UDP
download at 11:30.

To understand protocol traffic in general, read more at Distribution by Protocols.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 135


End User Traffic by QoS
Distribution by QoS shows end user traffic in the terms of service quality, giving high
troubleshooting capabilities in cases of high packet loss, notable latency and jitter, especially
concerning real time communication. This is particularly interesting to companies that provide a
QoS based service or use such services themselves. Data which was sent by the End user is
classified as Upload traffic, while data which was received by the end user is classified as
Download traffic.

To view traffic distribution by QoS:

1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose QoS from the Tab panel

As shown in the image above, traffic that belongs to this user is classified with different QoS
markers and therefore being differently treated while routed through the network. Traffic marked
with EF(46) marker is highly prioritized over other classes of traffic shown in this image, and has
guaranteed bandwidth, which is very suitable for services that require low latency, low packet loss
and negligible jitter. It is noticeable in the example image that the sudden increase of high priority
traffic affected the overall throughput of other classes of traffic causing higher latency and packet
drops for traffic with low priority markers.

To understand QoS traffic in general, read more at Distribution by QoS.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 136


End User Traffic by AS
Distribution by AS shows traffic for specific end user by autonomous systems. Being aware of
traffic users in your network generate towards other autonomous systems i.e. networks is of great
importance in terms of preventing and resolving various situations concerning network security and
reliability.

To view traffic distribution by AS:

1. Choose End Users node from the accordion in the Menu Panel
2. Search and select desired user from the Node Tree
3. Choose AS from the Tab panel

In the image above, you can see that this user has notable amount of Facebook traffic in download
direction, consuming large portion of available bandwidth between 12:03 p.m. and 12:15 p.m. as
well as YouTube traffic in upload direction around 13:02 p.m.

To understand AS traffic in general, read more at Distribution by AS.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 137


Inspecting Raw Data (Flow Records)
Raw Data files store flow records exported in a 5-minute interval.

Raw Data Tree groups Raw Data files in folders according to day/hour/minute. Selecting a node
from the tree allows inspection of specific Raw Data files.

Inspecting Raw Data

To inspect Raw Data:

1. Go To NetFlow > Raw Data > Files


2. Specify time period in Time Window. The main panel and Raw Data Tree will show
gathered files
3. Select files you want to inspect from the Main Panel (or alternatively, select a single file
from Raw Data Tree)
4. Click Show Selected

Raw Data table shows flow records from the selected Raw Data file(s). Data can be filtered,
grouped and sorted the by almost any field (source IP address, Bytes, Protocol etc.).

Clicking on Names button provides IP address resolution. If you move your mouse cursor over
specific IP address you can see WhoIs information about that host.

In order to enable IP
address resolution, your
NetVizura server should
have local or remote comm
unication with DNS server
(for Hostname) and Internet
access (for Whois
information).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 138


Exporting Raw Data
Raw Data table can be exported as a CSV file in order to present captured netflow records as a
report to a third party or for further analysis.

To export Raw Data, click on the the Export button in the upper right corner of the Raw Data
Table.

Grouping, filtering and


sorting the raw data table
will affect the CSV as well.
This will also make a CSV
file much smaller.

Depending on the amount of data, export can last a couple of minutes

Depending on your browser settings, browser may ask you were to save the file or it will
save the file to a default folder (usually Downloads folder). Some spreadsheet software
may ask you which separator to use when opening the file - select Comma.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 139


Using NetFlow Alarms
You can setup alarms to trigger if traffic goes over defined threshold. Alarms can trigger:
On this page:
on any node type (Exporter, Interface, Traffic Pattern, Subnet, Subnet Set, End Users)
several traffic types (total, host, conversation...)
for bps, pps, fps traffic or its combination Viewing Alarms in
for different direction of traffic (total, in, out, src in...) NetFlow module
Viewing All Alarms
Alarms can be sent to certain users to speed up notification of the right person. (Alarm Module)
Creating NetFlow
Alarms

Viewing Alarms in NetFlow module

Alarms that occurred during Time Window specified are visible as indicators in the Flow Module
within the Top talker table. For example, we can see below alarms for Facebook Traffic by hosts.

Click on the alarm indicator


will take you to more
detailed view of the alarm
in the Alarm module.

Alarms that have an arrow to the right are active alarms (trigger condition is still active). Only alarm
of the highest severity will be showed. The number in the Alarm table indicates how many alarms
occurred for that table entry during the Time Window.

Viewing All Alarms (Alarm Module)

To view all alarms, go to Alarm Module.

Click on the Source link will


take you to statistics for the
defined scope and object
for this alarm. In case of
NetFlow alarm, it will jump
to NetFlow module and
show the corresponding
node and traffic chart.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 140


Here you can see the list off all alarms that occurred within the selected Time Window. In our case,
we see that there are several hosts with high FB traffic. Occurrence indicators visualize time when
alarm started and ended. If the occurrence indicator blinks it means that the alarm did not end yet
(it is still active).

You are also able to filter, sort, group alarms by source and view only active alarms according to
your need.

Creating NetFlow Alarms


Error rendering macro 'excerpt-include' : No link could be created for 'Configuring NetFlow Alarms'.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 141


Understanding NetFlow System Traffic
System tab shows performance and system traffic for NetFlow module. Traffics available are:
On this page:
UDP packets collected
Flows processed
Performance metrics UDP Packet
Collected
Flows Processed
Performance
Metrics

UDP Packet Collected

UDP Packets show number of received and discarded packets. Viewing packet collection is useful
for checking if your NetFlow Analyzer experienced some packet losses.

To access this view, go to Top N > System > UDP Packets.

In some critical events such


as network attack, having
some amount of packet
losses is acceptable.

It is up to you to decide
much buffer memory to
reserve in order to collect
as much data as possible
during overflows.

Discarded UDP packets mean that your buffer is full - some of the packets sent by
exporters are not collected and will not be included as traffic information.

Flows Processed

Number of flows gives you statuses on the data processing.

Flows are categorized into:

Processed - flows that are not filtered out, dropped or unlicensed


Filtered - flows not processed due to filters set in > Settings > NetFlow Settings >
Aggregator Filtering
Dropped - flows rejected due to full buffer
Unlicensed - flows not processed due to license limitation
Total stored - total number of flows received (processed + filtered + dropped)

To view flow processing, go to Top N > System > Flows.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 142


Dropped flows mean that your buffer is full - some of the packets sent by exporters are
not collected and will not be included as traffic information.

Unlicensed flows (dark red on the graph) mean that your network devices are exporting
more flows than your license allows.These flows will not be processed by aggregator
and, therefore, information provided by them will not be included when creating and
displaying traffic. In this case, you should upgrade your license. Read more about Upgra
ding License.

Performance Metrics

Within Performance overview you can see various metrics that show how efficient is your
application.

Available metrics are:

Counters number - number of traffic monitoring counters (AS traffic, Service traffic etc.) If you have insufficient
memory on the server
Nodes number - number of traffic monitoring nodes (exporters, interfaces, subnets,
remember to consult with
Traffic Patterns and Subnet Sets
our post-installation guide
DB write time - time spent on writing counters to the database
on how to assign RAM to
DB aggregation time - time spent on compacting the database (creating grains)
NetFlow services (Tomcat
Alarm check time - time spent checking and triggering alarms and PostgreSQL).
Heap memory use - memory use after traffic is written to the database

Keep an eye on the Heap memory and how it is affected by the increase in monitored
nodes and counters (each time you add a node or create a TopN rule this numbers are
modified).

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 143


Using Activity Log
Activity Log shows the list of active application notifications (error, system, license and other
messages).

To view activity log, click on Show log arrow in the bottom right corner of the application.

One log includes information such as level, time, message and description.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 144


Using EventLog
In this chapter you will find out how to use EventLog module to see and analyze syslog and SNMP traps.

Viewing Syslog Messages


Inspecting Syslogs
Viewing SNMP Traps
Understanding Eventlog System Traffic
Using EventLog Alarms
Syslog How to...

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 145


Viewing Syslog Messages
To view syslog go to EventLog module and click Syslog tab. Here you can see syslog messages
sent from different exporters for a chosen Time Window. On this page:

1. Show Options
2. EventLog Chart Show Options
3. Severity Table Syslog Chart
4. Exporter Table Severity Table
5. EventLog Table Exporter Table
Syslog Table
Table and charts will show logs that have (1) the same severity as set in Severity Table (2) for the
time set in Time Window. For these logs Exporter table will show distribution by exporters and
Severity Table will show distribution by log's severity.

For example, on the screenshot to the left, you can see that logs that occurred during the selected
Time Window and severity 0 to 5 are shown. You can also see that there was 523,918 such logs
(Severity Table) of which most numerous were Warnings (55%) and Errors (29%).

You can also see the distribution of these logs by exporters in the Exporter table: exporter
x.x.6.201 generated the most logs (139,130).

Show Options

Show Options:

1. Refresh Data – manually refresh


data on charts and tables
2. Clear filters – clear all filters
3. Show Exporter Names – show
names of exporters (routers)
instead of their IP address

Syslog Chart

EventLog Chart shows distribution of syslog messages (logs) by severity:

1. Logs per bar (y-axis)


2. Time axis (x-axis)
3. Bar width
4. Zoom out

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 146


Chart shows number of logs in certain time chunks (1 minute, 1 day, 1 hour). Width of the chart
bars and number of bars depends on the Time Window selected. See table below:

Time Window Bar Width Number of Bars

Last hour 30 seconds 120

Last 6 hours 5 minutes 72

Last 12 hours 5 minutes 144

Last day 15 minutes 96

Last week 1 hour 168

Last month 6 hours 120

Chart has two axis: numerical y-axis and time x-axis. Numerical axis shows the number of logs per
bar. Time shown on the x-axis of the chart is the same time as set in the Time Window. Next to the
Syslog Chart is the Severity Table in which you can select if syslog messages of the certain
severity will be displayed on the chart or not. Colors on the chart correspond with the colors of the
syslog Severity in the Severity Table.

On the EventLog Chart above you can see that one bar on the chart represents logs during 30
seconds (bar = 30 seconds).

Severity Table

Severity Table shows log distribution by severity, for the logs of


selected severity that occurred in the selected Time Window. On
screenshot to the right currently selected severity levels are 0, 1, 2
and 3. This means that Syslog chart and tables will show only logs
with this severity levels. By clicking on the corresponding severity in
the Severity Table you can switch on/off logs of that severity.
Switched off severity is shown with a gray background and logs with
that severity are not shown on the carts and graphs.

Exporter Table

Exporter Table shows log distribution by


exporter, for the logs of selected severity
that occurred in the selected Time Window.
Top 7 exporters have a color assigned,
while other exporters are grey and under
Others on the pie chart. To see other

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 147


exporters, scroll down the exporter list.
Clicking on an exporter will show only logs
for that exporter on the charts and table. By
clicking on it again, you can switch back to
seeing logs for all exporters.

Syslog Table

EventLog Table shows messages with selected severity (in Severity Table) that were received
during time set in the Time Window. For each message Date, Exporter, Severity, Facility and
Message content is displayed. Severity levels are shown with the corresponding color, as in the
chart and Severity Table. 9/19 Figure 7: Exporter Table Figure 6: Severity Table Syslog Table can
be filtered by Exporter, Severity, Facility and Message content. Note that the filters can be
activated by selecting items in the Severity and Exporter Tables, as described above. To clear all
filters, click the Clear button above the Syslog chart. To show exporter DNS names, click the Show
Names button above the Syslog chart.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 148


Inspecting Syslogs
You can filter out unwanted logs based on log's severity, exporter, facility, date and time, and
message content.

NetVizura EventLog has three main types of syslog filters:

quick filters: severity and exporters

table filters

time filters (Time Window)

Quick filters are activated/deactivated by clicking on the corresponding severity in the Severity
Table, or clicking on the corresponding exporter in the Exporter table. Inactive severity/exporters
are marked with gray color, while active severity/exporters are colored. Logs from inactive
exporters and logs with inactive severity levels are not shown in the charts and tables, and are not
counted in the on-screen statistics.

Activating/deactivating severity or exporter filters will:

update Syslog Table filters for the corresponding exporter or severity level

refresh charts and Syslog Table,

refresh statistics in the Exporter Table and Severity Table

Note: Filters and data in Syslog Table, Exporter Table, Severity table always match each other.

Figure 10: Using filters in Syslog Table shows Syslog Table and Severity Table, and you can see
that the Severity filter in the table matches the active (colored) severity levels in the Severity Table.

Table filters are used to filter syslog messages by log's severity, exporter, facility and message text
body. To activate or change a filter simple type the value in the corresponding filter text field and
press Enter. This will update the data on all chats and tables.

Note: Multiple filter values are separated by commas.

To filter out the logs based on the time and date, change the Time Window value by clicking on it
and (1) choosing a value from the drop menu or (2) selecting from and to dates in the calendar.
Updating the Time Window will update the data on all chats and tables.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 149


Viewing SNMP Traps
To view SNMP Traps go to EventLog module and click SNMP Trap tab. Here you can see SNMP
Trap messages sent from different exporters for a chosen Time Window. Up to 30 traps will be
shown per page.

Data shown:

Date
Exporter
Trap OID
Trap details Trap details column contains
Alarms information about variable
bindings for each trap message.
You can resolve OID and exporter IP
names by clicking on the "Show names"
button above Trap table, as shown in the
screenshot below. Exporter names are
Hovering over any OID in Trap
resolved via DNS, and OID names are
OID and Trap Details columns will
resolved by extracting data from the MIB
display that OID's description in a
modules.
tool-tip.

If OIDs are not resolved, add the corresponding MIB module for that OID in > Settings > MIB
Settings > Modules.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 150


Understanding Eventlog System Traffic
To view NetVizura EventLog system state, click System tab while in View Mode.

System tab shows NetVizura EventLog system traffic. Tab is organized in two sections: Syslog and
SNMP Trap. Each section has a chart and a corresponding table as shown on the Figure 11:
System tab - Syslog messages.

Syslog messages:

Processed - logs processed by the service

Filtered - logs rejected by the service due to filtering

Dropped - logs dropped by the service due to high load

Unlicensed - obfuscated logs due to license limitations

Logs sent to NetVizura server are put in the buffer before processing. Logs are taken from the
buffer and matched against the license and Syslog filters. If the the number syslog exporters
exceeds the license limit - the log's message will be obfuscated (Unlicensed logs). If a filter marks
a log to be reject it will be not be stored or processed (filtered logs). If the buffer is full (to many
logs are being sent), incoming packets will not be stored or processed (Dropped logs). Logs that
are not dropped, obfuscated or filtered are counted as Processed log.

To manage your Syslog filters, go to > Settings > EventLog Settings > Syslog filtering. To
learn more about Syslog filters, go to

SNMP Trap messages:


Processed - traps processed by the service

Filtered – traps rejected by the service due to filtering

Unlicensed - obfuscated logs due to license limitations

Traps sent to NetVizura server are forwarded to SNMP4J library. Traps are matched against the
license and SNMP Trap filters. If the the number trap exporters exceeds the license limit - the
trap's message will be obfuscated (Unlicensed traps). If a filter marks a trap to be reject it will be
not be stored or processed (Filtered traps). Traps that are not obfuscated or filtered are counted as
Processed traps.

To manage your SNMP Trap filters, go to > Settings > EventLog Settings > SNMP Trap
filtering.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 151


Using EventLog Alarms
You can setup alarms to trigger if a specific condition is met on a syslog or trap message:
On this page:
For Syslogs, threshold is based on source IP, severity, facility and message content
For SNMP traps, threshold is based on source IP, OID and variable bindings.
Viewing All Alarms
It is possible to combine more threshold criteria (AND logical operand is implied). (Alarm Module)
Creating EventLog
Each alarm has its severity and you can override the severity of the syslog alarm. This is useful if Alarms
the default severity of a syslog does not correspond to alarm severity. For example, a fan is
malfunctioning in the data center. Usually, syslog for this event will have a severity warning, but in
this case data center is critical so it is wise to set the alarm severity higher.

Viewing All Alarms (Alarm Module)

To view all EventLog alarms, go to Alarm Module.

Here you can see the list off all alarms that occurred within the selected time period. In our case,
we can see Auth. warning alarm that we previously defined in Settings.

Occurrence indicators visualize approximate time (withing selected time window) when
alarm occurred.

You are also able to filter, sort alarms and view only active alarms according to your need.

Creating EventLog Alarms

Error rendering macro 'excerpt-include' : No link could be created for 'Configuring EventLog
Alarms'.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 152


Syslog How to...
See logs for a specific device only

Click on the device name or IP address in the Exporter Table or type the device's IP address in the
Exporter filter in the Syslog Table (text field under the Exporter column).

See logs for specific devices (more than one)

Type the IP addresses of the specific devices in the Exporter filter in the Syslog Table (text field
under the Exporter column) separated by comma.

See logs for all exporters

Click on the Total in the Exporter Table or clear the Exporter filter in the Syslog Table (text field
under the Exporter column).

See logs of specific severity level

Click on the wanted severity level in the Severity Table to make it active (colored), click on the
unwanted active severity levels to switch them off (they will turn gray); or, type the severity number
in the Severity filter in the Syslog Table (text field under the Severity column). Multiple severity
numbers must be separated by comma.

See logs with all severity levels

Clear the Severity filter in the Syslog Table (text field under the Severity column); or, click on the
inactive severity levels (gray) in the Severity table to make them active.

Set default severity levels shown

Go to > Settings > EventLog Settings > Configuration and under Service options set the
Maximum Severity Level Shown parameter. For example, if the parameter is set to 3, shown
severity levels will be 0, 1, 2, and 3.

Erase all filters quickly

Click on the Clear button above the Syslog chart.

See logs with specific facility

Type the facility number or name in the Facility filter in the Syslog Table (text field under the
Facility column).

See logs that contain specific text in the message text body

Type the specific text in the Message filter in the Syslog Table (text field under the Messages
column).

Filter out unwanted logs

Go to > Settings > EventLog Settings > Syslog filtering and make your filter. To learn more on
making filters, go to chapter Error: Reference source not found Error: Reference source not found
on page Error: Reference source not found.

Set the collection port for syslog messages

Go to > Settings > EventLog Settings > Configuration and under Service options set the
Syslog socket port parameter.

Change database settings

Go to > Settings > EventLog Settings > Configuration and set the database maintenance.

See my license details

Click on the Settings and Configuration icon ( ) and choose About.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 153


Using MIB
In this chapter you will find out how to use MIB module to see browse the MIB tree and get OID
values from your devices.

Searching OIDs
Setting Current Device
Making SNMP Request
Managing MIB Favorites
Reading MIB Details

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 154


Searching OIDs
To find a specific OID in the MIB Tree:

1. Click Search in the MIB Tree


2. Type the name (full or partial) or OID number in the text field of the Search tab
3. Press Enter or click Search in the Search tab

The search results will be shown in the Search tab. Name, (MIB) Module and OID number are
shown for each OID found. Clicking on an OID in the Search tab will select it in the MIB tree.

By default, up to 50 OIDs will be shown. To change the maximum number of OIDs


shown, go to > Settings > MIB Settings > Configuration and change the Search
results parameter.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 155


Setting Current Device
Current device is a device to which the SNMP requests are sent. You can set current device by:

1. Selecting a device from the application database


2. Adding Instant device
3. Selecting previously added Instant device

To select a device from the application


database, simply select it from the DB
devices list in the Device Tab (1). If the
device you want is not in this list you can
create it by going to > Settings > Control
Panel > Devices. For more information go
to article Configuring Devices.

Alternately, you can create an instant


device by clicking the Instant device button
(2). You need to enter IP address and
SNMP community string. Instant devices
have SNMPv2c and SNMP port 161.

All instant devices you add will be added to


the Instant device list (3).

Instant devices will not be saved


to application database and they
will be cleared after you log out.
Current device is displayed in the
Device in Use section of the
Device panel.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 156


Making SNMP Request
To request SNMP query:
On this page:
1. Select the desired OID
2. Click Request
Table Request
List requests
OID Value Setting

Result will display in the main panel (3) in a new tab. Title of the tab will be the OID name and it will
contain the device to which the SNMP request was sent to (the Current device).

On the screenshot we can see that SNMP query was sent to device cisco3550-xx (3) for the
ifTable.

If there is no Current device set, the application will prompt you to enter an instant
device. You can request the SNMP query from MIB tree or Favorites.

OID values returned by the SNMP request


can be displayed as a list (OIDs and their
values) or table, depending on the type of
the selected node in the MIB Tree.

MIB tree node types as shown in the


screenshot to the left:

1. Folder – returns a list of OIDs


2. Leaf – returns a single OID
3. Table – returns OIDs organized
into table
4. Table header - returns a list of
OIDs

Table Request

An example of SNMP query result table is shown on figure below. SNMP table contains name and
value for each OID corresponding with the same index. SNMP table has the fallowing information
and options:

1. Title – shows the MIB requested


2. Device – shows the device that returned the table (Current device)
3. Settable OIDs (marked in blue)
4. Pivot – pivoting the table
5. Next/Refresh – next table page / refresh

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 157


The table will show up to 100 rows by default. If the table has more rows, the Next option will be
displayed. Click next to get next 100 rows. To change the maximum
number of rows displayed,
Refresh option will show if there is less than 100 rows, or you reached the last page of the table go to > Settings > MIB
(after clicking Next). Click Refresh to send the SNMP request again. Settings > Configuration
and change the Table
response limit parameter.

List requests

Examples of list requests are shown on screenshot below:

The list will show up to 50 rows by default. If the list has more rows, the Next option will be
displayed. Click next to get next 50 rows. To change the maximum
number of rows displayed,
Refresh option will show if there is less than 50 rows, or you reached the last page of the list (after go to > Settings > MIB
clicking Next). Click Refresh to send the SNMP request again. Settings > Configuration
and change the List
response limit parameter.

OID Value Setting

You can set an OID value if it is marked in blue in the table returned by the SNMP request. To set
the OID value:

1. Click on the OID value


2. Select an OID value or type a value
3. Click OK

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 158


3.

To set an OID value and SNMP SET change to be successfull on a device, you need to
have:

1. WRITE or ADMIN permission for MIB module


2. READ_WRITE access level on device's SNMP policy
3. Enabled device remote SNMP setting

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 159


Managing MIB Favorites
To access Favorites click on the MIB tab and then click on Favorites.
On this page:
Favorite OIDs
Favorite OIDs
You can access you favorite OID from the Favorites. To request a SNMP Query on the Current Adding OID to
device: Favorites
Removing OID
1. Select on the desired OID in the Favorites tree from Favorites
2. Click Request

Result will display in the main panel in a new tab. Title of the tab will be the OID name and it will
contain the device to which the SNMP request was sent to (the Current device).

If there is no Current device set, the application will prompt you to enter an instant
device.

An example of Favorites
are shown on the
screenshot. The
Favorites shown are the
result of adding IfTable
to favorites.

we can see that the


Favorites are organized
hierarchically like the
MIB tree.

Adding OID to
Favorites

To add an OID to
Favorites right-click on it
in the MIB Tree and
select Add to Favorites.

When you add an OID to


Favorites you add every
OID contained in branch
of the MIB tree that
starts with that OID, too.
On the screenshot
above we see that
adding the ifTable also
added ifEntry, and its
belonging ifIndex,
ifDescr, etc.

Adding a Favorite will add that OID to your Favorites list only, it will not affect the
Favorites list of other users.

Removing OID from Favorites

To remove an OID from Favorites right-click on it in the Favorites Tree and select Remove from
Favorites.

When you remove an OID from Favorites you remove entire branch of MIB tree that starts with that
OID. For example, on screenshot above removing ifTable from Favorites also removes ifEntry, and
its belonging nodes ifIndex, ifDescr, etc.

Removing a Favorite will remove that OID from your Favorites list only, it will not affect
the Favorites list of other users.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 160


Reading MIB Details
Details panel shows more information for the OID selected in the MIB Tree or Favorites.
Information shown depends on the type of the MIB tree node type.

On the figure below we can see the details for ifTable: Name, OID number, Status, Access, Value
Type and Description.

To hide the details panel, click on


the double arrow icon in the top
right corner of the Details panel.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 161


Settings
This chapter covers NetVizura settings. Articles are grouped in:

General Settings
NetFlow Settings
EventLog Settings
MIB Settings

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 162


General Settings
In this chapter you will lean how to configure NetVizura:

User Settings
SNMP Policy Settings
Device Settings
License Settings
E-Mail Settings
Display Name Settings
Time Window Settings

Note: For some configuration administrator privileges are needed.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 163


User Settings
Administrator can view, add, edit, delete users and set their permissions.

To manage users accounts, go to > Settings > Control Panel > Users.

There are three user types:

Guest - shared account


User - normal user
Admin - administrator (can view system tab and Raw Data, manage license, users etc.)

Permissions for specific application features depend on the selected user type:

Feature My Favorites Control Module View Change Change


Account Panel
/ User permissio System Display Time-Win
ns tab Names dow

Guest Read None None None/Read No No No

User Write Write None None/Read/ No No Yes


Write

Admin Write Write Write None/Read/ Yes Yes Yes


Write

Selection of User Type implies pre-defined permissions for My Account,


Favorites, System tabs, Control Panel, Display Names and Time-Window.

Control Panel manages users, license, email settings, etc.


Permissions for Modules are allowed for custom selection.

Module permissions are used to choose user’s privilege level for a specific module.

For all modules in general:

None - user can not view module and its Settings


Read - user can view module and its Settings
Write - user can view module and edit its Settings

For NetFlow module specifically:

Read - user can also schedule Reports and view Report Settings
Write - user can also view Raw Data, edit Report Settings, view End Users and edit End
User Settings

To add a new user:

1. Click +Add
2. Insert user's Login and Contact Information into appropriate fields

3. Choose the Permissions from the drop-down lists


4. Click Save.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 164


4.

Info

First name, Last name, Username and Password are mandatory fields.
Email is needed for receiving emails (alarms and system emails).

Administrators (user type admin) will receive system critical alarms and
warnings via email.

To change an existing user:

1. Select desired user form the User table


2. Click Edit (pen icon)
3. Change Login or Contact Information text in the desired fields

4. Change Permissions level in the drop-down lists, if needed.


5. Click Save to apply changes.

Username can not be changed once the user is added.

To remove a user:

1. Select a user from the User table


2. Click Remove (-).
3. Click Yes to confirm removal.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 165


SNMP Policy Settings
Policies are used for discovery of devices in Traffic Statistics (exporters and interfaces) for NetFlow
Analyzer module and sending SNMP requests to devices in MIB Browser module etc.

Policy for a certain device in NetVizura has to match that actual SNMP configuration of
that device in order for to get SNMP reports for particular MIB or OID for that device.

Administrator can view, add, edit or delete SNMP policies.

To access Policies, go to > Settings > Control Panel > SNMP Policies.

On the screenshot to the left we can see Policy table together with some policy examples. As you
can see, table shows basic policy parameters:

1. Name
2. Port
3. SNMP version
4. v3 security level

Looking at the first policy “x comunity” we can see that the port used for SNMP is 161, and that
SNMP version is v2c. Naturally, since it is v2c there are no associated v3 security levels.

Adding a SNMP Policy

To Add a new policy, click the + Add button at the top of the Policy table.

Editing a SNMP Policy

To edit a policy, click on the pen (edit icon) or double click on the policy table row.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 166


Available policy parameters are: Name, Port, Timeout, Retries, Repeaters, SNMP version, Access
level, Username and SNMPv3 security level options (authentication protocol and password,
privacy protocol and password).

SNMPv3 security level options are only visible if SNMP version is set to SNMPv3.

When an SNMP request is sent to a device associated with a protocol the request will be sent to
the policy UDP port using the policy username as SNMP community and version. In order for
request to be successful the policy has to match the SNMP configuration of the target device.

Successful request will result in a number of packets each containing a number of OIDs set by the
Repeaters parameter (this is a number of SNMP request repeats in one SNMP Query). If the
request is unsuccessful, there will be a number of retries (Retries parameter) with a certain timeout
between each request based on the Timeout parameter (timeout incrementally grows after each
request).

In the example shown in the screenshot above the SNMP request in view mode will result in a
SNMPv3 request to a device on UDP port 161 with the above set security parameters. If the device
doesn't reply, there will be one more retry after 1000ms.

Removing a SNMP Policy

To remove a policy, click - (remove icon) in the Action column.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 167


Device Settings
To access Devices, go to > Settings > Control Panel > Devices.

Screenshot above shows the Device table. As you can see, table shows a list of devices with their
basic parameters:

1. Name
2. IP address
3. Port
4. SNMP Policy
5. SNMP version

Looking at the first device “cisco2950-xx” you can see that the its IP address is x.x.3.84 and that
the policy used on the device is “public”. Furthermore, you can see that the said policy is SNMP
v2c and that the UDP port used for SNMP is 161.

Devices are automatically added when device discovery is made in NMS and NetFlow
module. It is not possible to manually add a new device.

Read more about Device Discovery and Working with Exporters and Interfaces.

On the screenshot "Editing device" above you can see device parameters: name, IP address and
policy. Name is used to identify the device in the application, and IP to identify the device in the
network.

To change device name or policy:

1. Click on pen (edit icon), or double click on the Device table row
2. Set name or policy
3. Click Save

Choosing a policy:

If you know the SNMP configuration of the device and the corresponding policy, you can
choose the policy from the Policy drop-down list.
If you do not know the SNMP configuration of the device and the corresponding policy,
click on the Detect and the application will try each policy defined in the application on the
device specified. If successful, the Policy field will be automatically updated.
Additionally, you can test if the set device works by clicking on the Test button.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 168


License Settings
Administrator can view license information and manage license keys.
To learn about how to
To view your NetVizura license, go to > Settings > Miscellaneous > License. update or upgrade your
license, read more at Licen
It shows useful information such as: se.

License type
Application version
Expiration and support end date
Installation code

Installation code is needed for generating commercial license key. You can send it by clicking the
Send button (opens email client).

License is upgraded with a new license key by clicking the Upload.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 169


E-Mail Settings
Email account setup is needed in order to receive notifications via email (such as system warnings,
NetFlow alarms, license messages etc.).

Administrator can set SMTP server, Sender and SMTP password.

To do so, go to > Settings > Control Panel > E-Mail.

1. In a field SMTP Server type fully qualified domain name (FQDN) of your SMTP server
2. In a field From address type sender mail address
3. Include password only if it is required by your SMTP (outgoing) mail server. If not, leave If you have multiple
blank SMTP Password field. installations of NetVizura it
is wise for mail sender
address to correspond to
the server's name: NVtest
@domain.com or NV-produ
[email protected].

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 170


Display Name Settings
Administrator can set, and user can view DSCP, AS number, Service port and Protocol names and
descriptions. These names are used in the application instead of numbers to to provide more On this page:
human friendly statistics.
Configuring DSCP
Configuring DSCP Configuring AS
Configuring
NetFlow Analyzer has a searchable built-in register of DSCP names and numbers. You can Service
change DSCP name and description. DSCP numbers are not changeable. Configuring
Protocol
To configure DSCP, go to > Settings > Miscellaneous > Display Names > DSCP.

Configuring AS

NetFlow Analyzer has a searchable built-in register of AS names and numbers. AS register is
taken from IANA.org. AS numbers (ASN) are not changeable, but new autonomous systems can
be added. In the unlikely event of NetFlow Analyzer built-in register not having the ASN you are
looking for, you can retrieve it by visiting IANA.org. You can change AS name and description.

To configure AS, go to > Settings > Miscellaneous > Display Names > AS.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 171


Configuring Service

NetFlow Analyzer has a searchable built-in register of Service names and numbers. You can
change Service name and description. Service numbers are not changeable, but new services can
be added.

To configure Service, go to > Settings > Miscellaneous > Display Names > Service.

Configuring Protocol

NetFlow Analyzer has a searchable built-in register of Protocol names and numbers. You can
change Protocol name and description. Protocol numbers are not changeable, but new services
can be added.

To configure Protocol, go to > Settings > Miscellaneous > Display Names > Protocol.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 172


NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 173
Time Window Settings
Each user can set his Time Window preference:

Default Time Window - time period that will be selected each time you log-in to
application.
Date preference - format in which date ranges will be presented

To configure Time Window, go to > Settings > Miscellaneous > Time Window.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 174


NetFlow Settings
This chapter explains how you can set your NetFlow Analyzer:

Traffic Pattern Settings


Subnet Settings
Subnet Set Settings
End User Settings
TopN Settings
NetFlow Alarm Settings
NetFlow Filtering Settings
NetFlow Sampling Settings
NetFlow System Settings

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 175


Traffic Pattern Settings
NetFlow users can view and NetFlow administrator can add, edit, delete or clone a Traffic Pattern.

Traffic Patterns allow you custom monitoring of any specific traffic type you want, independently of
your physical infrastructure. For example:

All traffic - comes predefined (entire network overview)


Internet traffic (with external network)
Emal traffic (with your email server) If you are not familiar with
Social networks (Facebook, YouTube, etc.) Traffic Patterns, go to
Blocked traffic (sent to Null interface) article Traffic Patterns and
then proceed to the article
To create new or configure existing Traffic Patterns, go to > Settings > NetFlow Settings > Advanced Traffic Patterns f
Patterns. or advance usage and
examples.

To create a new Traffic Pattern, click +Add.

Adding a Traffic Pattern consists of four steps:

Defining the Traffic of Interest


Setting IP Address Ranges
Fine-tuning a Traffic Pattern
Manual Deduplication

It usually takes 10 minutes for NetFlow Analyzer to aggregate and show the statistics for
the new Traffic Pattern.

In case Exporter filter is used in the Traffic Pattern definition and the Exporter IP address
changes, you will have to manually update it in the Traffic Pattern definition.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 176


Defining the Traffic of Interest
First think about the traffic you are interested in. Ask yourself:

Who is talking to whom? In which networks or subnets are the end points?
Are both sides of the conversation in your network (Self-Traffic), is one outside of your
network (Normal), can one side of the conversation be both in your network and outside of
it (Custom)? (This will help you to choose the Traffic Pattern type.)
Where are these networks located – inside or outside of your company network? (This will
help you define the Internal and External Network.)
Is there something very specific about the traffic in question, such as the destination AS,
used service port or protocol or some specific QoS marker? (This will help you choose the
necessary filter.)

After this you should have a clear understanding of how to build your Traffic Pattern: Internal and
External IP address ranges, and additional filtering by exporter, interface, service port, QoS,
protocol etc.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 177


Setting IP Address Ranges
Internal and External Networks are defined with their IP address ranges. Determine which IP
addresses belong to these networks to define them. You can both include and exclude IP address
range from the network definition, giving you flexibility and more freedom in shaping the definition
of Internal and External Networks.

Screenshot below shows the Address tab which is used for setting the IP address ranges:

In this screenshot you can see a Traffic Pattern were Internal network consist of 4 subnets and
External network with no subnets defined (effectively this is any subnet). This Traffic Pattern will
monitor traffic between these four subnets and any other network, including internal traffic (traffic
between IPs that belong to any four subnets in the Internal Network).

To help you in Traffic Pattern creation, NetFlow Analyzer offers three types of Traffic depending on
the direction of traffic in regards to you Internal network. These three types will also help you
create Traffic Patterns more quickly because they will include or exclude some address ranges
form the Internal or External Network automatically. These Traffic types are:

Normal Traffic
Self Traffic
Custom Traffic

Self Traffic

If you wish to monitor traffic that originates from and ends in your network or its part (your network
is both the source and the destination of the traffic), then you choose the Self Traffic,
assuming that you previously correctly configured all subnets that exist in your network. If, for
example, you wish to monitor the traffic that originates from the 10.0.0.0/8 network (which can be
divided in multiple subnets) and ends up in the same network, we simply enter 10.0.0.0/8 in
the Internal address ranges field and click on the Include command. The same address will be
automatically entered in the include section of the External address ranges field on the right-hand
side of the panel. Defined in this way, the Traffic pattern will collect information on all traffic that
originates from the 10.0.0.0/8 network and ends up within the 10.0.0.0/8 network. If we wish to
monitor only a specific service or protocol, it is possible to add additional filters as mentioned
earlier.

Normal Traffic

A Normal Traffic is used when we wish to monitor traffic which originates from an internal network
and ends up in an external network, such as the Internet. If, for example, we wish to monitor the
traffic that originates within the 10.0.0.0/8 network and ends up outside of that network we
enter 10.0.0.0/8 in the Local Address Range field and click on the Include command. On the
right-hand side of the panel, in the External Address Range field, the same 10.0.0.0/8 network will
be automatically entered in the excluded section. This Traffic Pattern will monitor all the traffic
originating within the 10.0.0.0/8 address range and ending up outside that address range.
Additional filters can be set up to further filter out the traffic.

Custom Traffic

A Custom Traffic is used when you wish to monitor traffic which is a combination of two previous
cases. In the case of such Traffic Pattern, there is no correlation between Internal and
External address ranges fields.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 178


Fine-tuning a Traffic Pattern
Mandatory criteria needed for creating a Traffic Pattern is the IP address criteria. Namely, it On this page:
is mandatory to enter at least one address range in the Internal Address range field.

Also, it is possible to set up additional filters using the include and/or exclude commands. Filtering Based
Additional filters are based on: on Exporter
and its
Exporter and its interfaces Interfaces
Filtering Based
Service on Service
Filtering Based
AS on AS
Filtering Based
Protocol
on Protocol
Filtering Based
QoS
on QoS
Filtering Based
Next Hop
on Next Hop

These filters can be freely combined to make very specific Traffic Patterns which are matching
the traffic you are interested in. For instance, by combining first three filters, you can monitor the Related pages:
traffic from a single network device that uses a specific service in communication with a specific
Autonomous System. Setting IP
Address
Ranges

Bare in mind that this filters are for fine-tuning your Traffic Patterns. In particular, this
means that the filter is applied only to the traffic matched by a given Traffic Pattern IP
address range. In other words, an IP address from the Traffic Pattern definition is applied
first, and then the filters are applied.

Therefore, if you want to monitor all traffic that goes from your internal network via
certain exporter/service/AS/protocol/QoS, you need to apply that filter to a Traffic Pattern
that covers all traffic (such as All traffic Traffic Pattern). Likewise, if you want to monitor
the traffic from a particular Traffic Pattern via certain exporter/service/AS/protocol/QoS, a
pply that filter to that Traffic Pattern.

Filtering Based on Exporter and its Interfaces


To cancel any changes to
To create a filter based on the IP address of the exporter or its interface: the filter, click Reset.

1. Go to > Settings > NetFlow Settings > Patterns


2. Add new or Edit existing pattern
3. Click the Exporter tab.

You can monitor the traffic that has been exported by a single device (exporter) or that
has entered/exited a specific interface of that particular device (exporter).
The Exporter IP field is used to specify the IP address of the exporting device, while Interface In
and Interface Out fields are used to specify the SNMP ID of one or more interfaces of the device.
Use the Include and Exclude options to include or exclude several interfaces of the exporter from
the filter.

This filter is most commonly used to remove duplicate flows. Read more at Resolving
Duplicated Export.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 179


An Exporter filter example is given on the figure below: the Traffic Pattern with this filter will only
match flows that pass through exporter X.Y.4.38 and only if the flow passed through interface 2 in
ingress (In) direction and passed through interface 5 in egress (Out) direction.

You can either include one or more exporters, or exclude one or more exporters.
It is not possible to have included and excluded exporters in a single Traffic
Pattern.
Device must be an exporter (actually export netflow data to the NetFlow Server)
in order for filtering to have any effect.
IP address used to identify the exporter is the IP address the router has been
configured to export the netflow data from.

Example 1

We want to monitor all traffic exported by a network device with the IP address
10.1.1.1. Furthermore, we are only interested in the traffic that has entered through interfaces with
SMNP IDs 1 or 2 and exited through interface 4.

Here is how to make the filter:

1. Type in 10.1.1.1 into Exporter IP field


2. Type in 1,2 into Interface In field
3. Type in 4 into Interface Out field
4. Select Include radio button (default)
5. Click Add

6. Click Save

This filter translates to “traffic must pass through router 10.1.1.1, entering through
interface 1 or 2, and exiting through interface 4”.

Example 2

We want to monitor all traffic from a single physical link. This link is on a network device with the IP
address 10.1.1.1, interface with SMNP ID 1. This means that interface 1 is both In and
Out interface. The device is an exporter.

Here is how to make the filter:

1. Type in 10.1.1.1 into Exporter IP field.


2. Type in 1 into Interface In field.
3. Leave the Interface Out field empty

Do not set Interface Out field to 1 here. This would make an invalid filter, since
flow can not enter and extit the exporter on the same interface at the same time.

4. Select Include radio button (default)


5. Click Add
6.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 180


6. Type in 10.1.1.1 into Exporter IP field, again
7. Leave the Interface In field empty
8. Type in 1 into Interface Out field
9. Select Include radio button (default)
10. Click Add
11. Click Save

This filter translates to “traffic must pass through router 10.1.1.1, entering through
interface 1, or pass through router 10.1.1.1, entering through interface 1”.

Example 3

To monitor the traffic that entered through the Interface with SNMP ID 1 on any/all exporters:

1. Leave the Exporter IP field empty


2. Type in 1 into the Interface In field
3. Leave the Interface Out field empty
4. Select Include radio button (default)
5. Click Add
6. Click Save

Exporter table added an entry "Exporter IP: all Interface In: 1". This indicates that
interfaces In with the SNMP ID 1 of all network devices are included in this filter.

Example 4

To exclude the traffic entering through a specific interface on a specific exporter:

1. Type in 10.1.1.1 into the Exporter IP field, where 10.1.1.1 is Exporter's IP address
2. Type in 1 into the Interface In field, where 1 is SNMP ID of interface we are not interested
in
3. Leave the Interface Out field empty
4. Select Exclude radio button (default)
5. Click Add
6. Click Save

Exporter table added an entry Exporter IP: 10.1.1.1 Interface In: 1 Interface Out: all and
that Exclude and Include radio buttons are disabled, while the Exclude radio button is
active. This indicates that the only traffic that will be excluded from the Traffic Pattern will
be the traffic entering through the Interface 1 on the network device with the IP address
10.1.1.1.

Filtering Based on Service

To create a filter based on the service:

1. Go to > Settings > NetFlow Settings > Patterns


2. Add new or Edit existing pattern
3. Click the Service tab.

You can filter traffic based on services by including or excluding one or more service
ports. Filtering is done by inserting service port numbers for the source and destination AS. This
enables you to monitor the traffic utilizing certain service ports or services only.

Screenshot below shows the an example of service filter.

To cancel any changes to

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 181


the filter, click Reset.

If you do not know the service you wish to include/exclude, go to > Settings >
Display Names > Service tab and do a search on the desired service port.

Example

We want to monitor all traffic exported by a network device with IP address 10.1.1.1. Furthermore,
we are only interested in the traffic that has entered through interfaces 1 and 2 and exited through
interface 4:

1. Type in 10.1.1.1 into the Exporter IP field


2. Type in 1,2 into the Interface In field
3. Type in 4 into the Interface Out field
4. Click on the Include radio button (default)
5. Click Add to add this filter to the filter list
6. Click Save

Filtering Based on AS

You can filter traffic based on AS, by including or excluding one or more Autonomous
Systems. Filtering is done by inserting AS numbers (ASN) for the source and destination AS. This
enables you to monitor the traffic between going to or coming from a certain AS or AS group and
the traffic between two AS or AS groups.

Screenshot below displays an example of AS filter:

Leaving the Source/Destination AS Number(s) field empty will have a meaning


equal to inserting all Autonomous Systems
If you do not know the ASN of the AS you wish to include/exclude, go to >S
ettings > Display Names > AS tab and do a search on the desired AS name

Filtering Based on Protocol

You can filter the traffic based on the protocol, by including or excluding one or more
protocols. Filtering is done by inserting protocol numbers into the Protocol Number(s) field. This

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 182


enables you to only monitor the traffic including a certain protocol or protocols, or to monitor the
traffic excluding a certain protocol or protocols.

This screenshot shows the configuration of the protocol filter:

If you do not know the Protocol Number of the protocol you wish to include/exclude, go
to > Settings > Display Names > Protocol tab and do a search on the desired
protocol name or locate the protocol in the Protocol table.

Filtering Based on QoS

You can filter the traffic based on QoS, by including or excluding one or more QoS markers.
Filtering is done by inserting the ToS field into the ToS list field. This enables you to only monitor
the traffic including or excluding a certain level(s) of QoS, or in other words including or excluding
certain ToS fields.

The configuration of the QoS filter:

If you do not know the exact ToS for the QoS level you want to monitor, go to > Sett
ings > Display Names > DSCP tab and locate the desired DSCP number in the table.

Filtering Based on Next Hop

You can filter the traffic based on next hop, by including or excluding one or more next hop IP
addresses. Filtering is done by inserting the IP address for next hop field into the Next Hop IP field.
This enables you to monitor only traffic including or excluding a certain next hop.

The configuration of the Next hop filter:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 183


A case when the Next Hop filtering is particularly useful is when the network architecture
and configuration forces you to have double netflow export. This situation is further
explained in the article Manual Deduplication.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 184


Manual Deduplication
In general, if you correctly configured exporters (ingress/egress) and decided to enable automatic
deduplication by exporting from all devices in flow continuity then all flows in your Traffic Patterns On this page:
should be automatically deduplicated. Read more in Configuring NetFlow Export (Ingress vs.
Egress) and Enabling Automatic Deduplication.
Deduplication
However, if this is not the case then it is also possible for you to adjust Traffic Pattern configuration based on the
in a way to achieve flow deduplication. central exporter
Deduplication
based on exporters
Before proceeding, pay attention to first disable automatic deduplication (at > Settin and their interfaces
gs > NetFlow Settings > Configuration). Deduplication
based on next hop

Deduplication based on the central exporter

If you have a central exporter (a netflow exporter through which all desired traffic is passing
through) then preventing duplicated Traffic Pattern traffic is easy. You just need to add a filter to
the Traffic Pattern in the Exporter section of the Traffic Pattern definition. Add the IP address of the
central exporter while include option is set. This will result in Traffic Pattern matching only netflow
that was exporter by the central exporter.

In our example above, flow that passes and is exported by three routers (R1, R2 and R3) will be
taken into account and processed only from central router (R2) since Traffic Pattern includes its IP
address in Exporter filter.

Have in mind that all other traffic (passing via central exporter) will not be captured.

Learn more about Filtering Based on Exporter and its Interfaces.

Deduplication based on exporters and their interfaces

If you do not have a central exporter and/or your network topology is more complex you can
prevent duplicated Traffic Patterns by entering exporters and their specific interfaces from which
you will either include or exclude traffic when matching traffic to a Traffic Pattern. In this way you
can exclude specific interfaces on exporters that would duplicate the traffic.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 185


In the example above, flow travelling via R1 and R2 will not be duplicated since R2 is not an
exporter, however flow travelling via R1 and R3 will be duplicated. By excluding Interface Out: Vl3
on Exporter R1 only export from exporter R3 will be processed.

Have in mind that all other traffic (via included exporters and interfaces) will be captured.

Learn more about Filtering Based on Exporter and its Interfaces.

Deduplication based on next hop

In the example below, a flow travelling from Host A to Host B passes via two central routers R1
and R2. As a consequence, one flow is exported and processed to a netflow server twice (by R1
and R2). This should be overcome by adding next hop filter.

The solution is to exclude R2 as Next Hop IP address. This will simply skip all the flows passing
from router R1 to R2. Flows will be then matched and processed only by router R2. The same
applies for flows from Host B to Host A - excluding R1 as Next Hop will skip flows from R2 to R1.

Have in mind that all other traffic (not having R2 and R1 as next hop) will be captured.

Learn more about Filtering Based on Next Hop.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 186


NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 187
Subnet Settings
Subnets are used in charts to show the distribution of the traffic within a Traffic Pattern. Created
subnets will be automatically displayed under a Traffic Pattern if its IP address range is included in
the Traffic Pattern's Internal Network.

NetFlow users can view and NetFlow administrator can add, edit or delete Subnets.

To configure subnets, go to > Settings > NetFlow Settings > Subnets tab.

Tip

To get a precise display of


traffic distribution it is a
good practice to define
subnets covering entire IP
address range of a bigger
subnet. If one or more
subnets are not defined,
their traffic will be added to
"Others" (gray in charts and
tables) even if they would
be in top talkers otherwise.
If Others entry covers a lot
of traffic in your Traffic
Pattern, you should add
more subnets.

To add a new subnet:

1. Click Add
2. Type in subnet_name into the Name field (optional)
3. Type in subnet_ip_address_and_mask into the Address field.
4. Click Save.

Note that any new subnet will be automatically added in the subnets hierarchy, and in all Traffic
Patterns if its IP address range belongs to the Internal Network of the Traffic Pattern.

To remove a subnet from the database:

1. Select the desired subnet from the table


2. Click Remove
3. Click Yes to confirm removal

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 188


Subnet Set Settings
Subnet Sets are a set of subnets grouped by some logical criteria you define, independent to
the IP address range. To read more, go to Subnet Sets.

NetFlow users can view and NetFlow administrator can add, edit or delete Subnet Sets.

To configure subnet sets, go to > Settings > NetFlow Settings > Subnet Sets tab.

To add a new Subnet Set to the database:

1. Click Add
2. Type in subnetset_name into the Name field
3. Type in subnetset_description into the Description field (optional)
4. Add subnets from the Available Subnets list to your SubnetSet
Available Subnets list displays all subnets you previously defined that are not
members of any Subnet Set, while the Available Subnet Sets list displays all Subnet Sets
that are already created.
A subnet can be a member of only one Subnet Set.

5. Add Subnet Sets from the Available SubnetSets list to your Subnet Set
6. Click Save.

Note that new Subnet Sets will be automatically displayed under a Traffic Pattern if its IP address
range is included in the Traffic Pattern's Internal Network.

To remove a subnet from the database:

1. Select the desired subnet set from the SubnetSet table


2. Click Remove
3. Click Yes to confirm removal

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 189


End User Settings
NetVizura is capable of detecting end user activity in the company network. End user traffic is
identified by mapping IP address provided in syslog logon event and IP address provided in On this page:
NetFlow data. Logon events could be generated by Domain Controllers or Work Stations
relayed via Syslog server to NetVizura server. We use Windows Domain Controller in our example. Step 1. Select
appropriate
message (logon
NetVizura comes with predefined matching rules for Snare Open Source Syslog agent: event):
Match String
In > Settings > NetFlow Settings > End Users there is already predefined logon Step 2. Setup rule:
rules for collecting logon events from Snare syslog agent. You can activate it by clicking
Active at Status field. Double click on rule opens rule condition where you can change S
ource IP to more specific value to increase performance and check collection of logon
events by clicking on Verify match. By default
collection port for logon
events is set to 33515 so
the syslog's should be sent
to 33515 port at NetVizura
server. If you want to
change the port go to
> Settings > NetFlow
For detailed explanation on how to install and configure Snare Syslog agent see Installin Settings > Configuration
g and Configuring Syslog Agent for End User Traffic. and search for End users
collection port value.

Example of correct match string from Snare

* MSWinEventLog * 4624 Microsoft-Windows-Security-Auditing * Success Audit * Logon


Type: 3 * Account Name: <USERNAME> * Account Domain: <DOMAIN> * Source
Network Address: <USER-IP> *

Step 1. Select appropriate message (logon event):

Navigate to Netvizura Eventlog module and choose Syslog tab. Identify syslog message with
logon information. This log should contain:

1. IP address of domain controller that exports Syslogs - type IP address into Exporter text
box and press Enter

2. Windows code 4624 that designates successful logon event - type 4624 into Message filte
r text box and press Enter
3. Select, copy and paste text message in some text editor (Wordpad or similar)
4. Create appropriate Match string in text editor

Match String

Steps for creating correct match string :

1. Find Account Name within the message and put <USERNAME> instead of real account
name (please refer to picture below)

2.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 190


2. Find Account Domain within the message and put <DOMAIN> instead of real account
domain (please refer to picture below)
3. Find Source Network Address within the message and put <USER-IP> instead of real IP
address (please refer to picture below). No need for this step in case of Work
Station type of rule.
4. Find additional information that can help in matching message more precisely like: MSWin
EventLog, 4624 Microsoft-Windows-Security-Auditing, Success Audit, Logon Type:
3
5. IMPORTANT: Delete any other text and put * as a wildcard instead of deleted text (refer
to Example of correct match string)

Step 2. Setup rule: In order to improve system


performance, we
In upper right corner of Netvizura application navigate to > Settings > NetFlow Settings > recommend to set status as
End Users: inactive for all rules that are
not in use.
1. Click on + Add button
2. Enter your own Rule Name and Description
3. Set Rule type (in this example set Domain Controller)
4. Set Rule status (in this example set Active)
Specifying too broad
5. Enter Source IP (IP address of Domain Controller)
subnet in the Source IP fiel
6. Copy and paste Match string from text editor into the Match string area
d might result in
7. Click on Verify match button performance penalty. For
8. Click on Save button to save your rule (if verification is successful) best results consider
changing Source IP to
more specific value or
concrete IP address.

Use help button: Move your


cursor under the question
mark on the screen for
additional help.

You can easily verify the


rule by clicking Verify. It
will check if any Syslog
To check results of your work, navigate to NetFlow > End Users. If the three is empty, refresh
message from the last 24
your web browser with ctrl+F5.
hours matches the rule.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 191


TopN Settings
By default, the number of top talkers that appear in the chart and table for any node and statistic is
set to 10. This is defined by the Default TopN rule. In addition to a default rule, you can create
specific rules for specific nodes i.e. rise or lower top talkers followed for certain type of traffic the
that node affected by the rule.

NetFlow users can view and NetFlow administrator can add, edit or delete TopN rules.

To configure TopN rules, go to > Settings > NetFlow Settings > TopN tab.

To change default TopN rule:

1. Choose Edit Default rule (click on pen icon button, or double click on table raw)
2. Update the TopN shown fields as wanted
3. Confirm with Save

To add a new TopN rule:

1. Click Add
2. Give a Rule Name
3. Choose Node for which the rule will apply to
1. Choose Note type (Exporter, Interface, Traffic Pattern, Subnet, Subnet Set, All
Users, End User, Domain)
2. Click Select to choose a node (popup showing all available nodes will show)
4. In TopN shown section change the topN count for a traffic distribution (host, conversation,
service...)

You need to login/logout to be able to view these changes on charts and tables.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 192


NetFlow Alarm Settings
NetFlow users can view and NetFlow administrator can add, edit or delete alarms.

To configure NetFlow alarms, go to > Settings > NetFlow Settings > Alarms.

To add a new alarm in NetFlow Analyzer:

1. Click Add
2. Set Alarm information (name, description, level, scope, object and optionally mail-to
recipients)

Scope determines on which nodes an alarm will be applied: any or specific


exporter, interface, subnet, Subnet Set or Traffic Pattern.
Object determines what type of traffic will be matched against the alarm threshold
criteria: total, interface, subnet, protocol, host, AS, conversation etc.
Recipients list (optional) determines to whom will an email be sent if the alarm
triggers. Only users with emails associated to their user account can be
recipients.
3. Set Alarm threshold.
Threshold can be in flows, packets or bits. It is possible to combine more threshold criteria
by using AND, OR and NOT logical operands.
4. Click Save

Figure above shows an example of an Alarm. This alarms triggers if any host in the network has
more than 6 kbps of Facebook traffic in 5 minutes. Facebook traffic is identified via Facebook
Traffic Pattern. On alarm trigger an email will be sent to Winter Jon and Goldberg Dany.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 193


NetFlow Filtering Settings
Aggregator filtering sets filters for all received flows on application level in
order to filter unnecessary flows from processing.

NetFlow users can view and NetFlow administrator can add, edit, delete or
reorder aggregator filters.
To configure aggregator filtering, go to > Settings > NetFlow Settings > Aggregator
Filtering tab.

You are able to accept or reject any traffic coming via:

Source IP Protocol
Destination IP Exporter IP
Source port Interface in
Destination port Interface out

Note that filters are executed in their order. Default filter is always applied last.

If you add filters, you can have two filter strategies:

Set default filter to reject all flows and create specific filters that explicitly accept certain
flows
Set default filter to accept all flows and create specific filters that explicitly reject certain
flows

In case Exporter IP is used to create a filter and that netflow exporter changes its export
IP address, you will have to manually updated the filter.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 194


NetFlow Sampling Settings
When core network devices have a very large amount of traffic passing through them, you may
decide that your exporter device sends sampled netflow data to lower CPU load. In this case,
sample ratios enable you to multiply metric values and get a more realistic traffic in the graphs.

NetFlow users can view and NetFlow administrator can add, edit or delete exporter sampling rules.

To configure sampling rules, go to > Settings > NetFlow Settings > Sampling tab.

To add an exporter sampling rule:


If you don't want to multiply
1. Click Add a metric, simply enter ratio
2. Enter IP address of the exporter you want to multiply data for 1.
3. Enter sample ratios ( Bytes, Packets and Flows)
4. Click Save

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 195


NetFlow System Settings
NetFlow users can view and NetFlow administrator can manage:

Service Options
NetFlow Database Maintenance
Archiving Raw Data
Importing/Exporting Settings
Automatic Deduplication

To access NetFlow system configuration, go to > Settings > NetFlow Settings > Configuration.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 196


Service Options
To configure service options, go to > Settings > NetFlow Settings > Configuration tab.

NetFlow General

Collection port - port used by the application to receive the netflow data. The value has
to be the same as the value set on your network devices which export the netflow data
(Exporters). Default value is 2055.
Collection port timeout - UDP socket timeout in seconds

End Users

End users collection port - port used by the application to receive the user logon/logoff
syslog messages. The value has to be the same as the value set on your syslog agent.
Default value is 33515.
End users collection port timeout - UDP socket timeout in seconds

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 197


NetFlow Database Maintenance
NetFlow database stores the data needed for chart and alarms in NetFlow module. You can
configure NetFlow database in > Settings > NetFlow Settings > Configuration with the
following parameters:

Maximum database size - oldest data will be removed first


Minimum database size in weeks - the system will warn you before database space runs
out

NetFlow Analyzer will warn you if your storage space is full and tell you exactly what actions are
advised. Warnings are sent by email to NetVizura administrators and displayed when you log-in.
Warning message is triggered when application concludes that Maximum database size will be
reached without storing minimum amount of traffic in weeks (Minimum database size in weeks).

Example of storage warning message for Maximum database size set to 30 GB and Minimum
database size in weeks set to 52 weeks:

9 weeks of data (5.5 GB) still needs to be stored, but only 5 more weeks' worth of
space (3 GB) remain in the database storage.

You need to provide more space for NetFlow database (currently set to 30 GB),
or lower the minimum number of weeks (currently set to 52 weeks) for which you
would like to keep the data. 52 weeks is approximately 33 GB.

NetFlow database stores the data needed for chart and alarms in NetFlow
module. When the database size increases beyond configured limit, oldest entries
will be deleted although those entries would fall within configured minimum
number of weeks - consequently charts and alarms corresponding to deleted
entries would be missing.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 198


Archiving Raw Data
NetFlow archive stores Raw Data files. These files can be analyzed in the Raw Data tab in
NetFlow module. Archiving data is configured in > Settings > NetFlow Settings >
Configuration by setting:

Temp folder - folder in which NetFlow Analyzer will temporary unpack Raw Data files

Archived files folder - folder in which NetFlow Aggregator stores processed files

Legacy raw files folder - folder in which NetFlow stores Raw Data files from previous
versions
Minimum free disc space - minimum free hard disk space is a value that needs to be free
on the NetFLow Server in GB. Once saving of new Raw Data file threatens to lower free
hard disk spaces bellow this value, NetFlow will delete the oldest Raw Data files freeing up
the disk space. Default value is 100 GB.
Minimum archive size in days - the system will warn you up to 7 days before archive
space runs out

NetFlow Analyzer also warns you if your archive space is full and tells you exactly what actions are
advised. Warnings are sent by email to NetVizura administrators and displayed when you log-in.
Warning message is triggered when application concludes that Minimum free disc space will be
reached before minimum amount of Raw Data files in days is stored (Minimum archive size in
days).

Example of archive warning message for Minimum number of days set to 30 and Minimum
disk space set to 2 GB:

10 more days of data (30 GB) still need to be stored, but only 7 more days' worth
of space (21 GB) remains in the archive storage.

You need to provide more space for archive files. You can also move existing
files to another location, or lower the minimum number of days (currently set to
30) for which you would like to keep the archive files. (30) days of archive files is
approximately 90 GB.

NetFlow archive stores Raw Data files. These files can be analyzed in the Raw
Data tab in NetFlow module. When the NetFlow archive is full, oldest Raw Date
files will be deleted, although those Raw Data files would fall within configured
minimum number of days.

Space estimation is based on the average size of your raw data file.
Remaining space for the archive is calculated by deducting Minimum free disk
space from the current available free disk space.
In the above example, if Minimum free disk space is 2GB, the warning message
will trigger when free disk space goes under 23GB.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 199


Importing/Exporting Settings
If you are upgrading software, you might want to transfer your previous settings from old version to
new version of your NetFlow Analyzer. This is possible by export and import.

To export your settings:

1. Log-in to old NetFlow Analyzer version


2. Go to > Settings > NetFlow Settings > Configuration and click Export
3. Your settings parameters will be downloaded in a XML file

If you already added Traffic Patterns, Subnets, Subnet Sets, alarms etc. to new version
of NetFlow Analyzer, you will need to remove all entries before proceeding further to
avoid duplication.

To import your configuration:

1. Log-in to new NetFlow Analyzer version


2. Go to > Settings > NetFlow Settings > Configuration and click Import
3. Select the XML file and click Open
4. Verify that all your settings parameters is correct

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 200


Automatic Deduplication

To understand duplication problem and how automatic deduplication is used, read


article Deciding Whether to Use Automatic Deduplication.

To enable automatic deduplication:

1. Go to > Settings > NetFlow Settings > Configuration > Automatic Deduplication
2. Select Enable

In order to achieve automatic flow deduplication in Traffic Patterns and Subnet


Sets, it is required that ALL devices in flow continuity are configured as
exporters.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 201


EventLog Settings
To access it, go to > Settings > EventLog Settings.

Here you can set Syslog filtering, SNMP Trap filtering, and NetVizura EventLog service and
database maintenance options.

EventLog Filtering Settings


EventLog Alarm Settings
Eventlog System Settings

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 202


EventLog Filtering Settings
Syslog Filters

Syslog Filters are used to make explicit rules to filter out unwanted syslog messages. Filtered out
messages will not be processed, stored and showed in the EventLog charts and tables. To access
Syslog Filters, go to > Settings > EventLog Settings > Syslog filtering.

By default, there is only one Syslog Filter named Default that accepts all syslog messages. On the
Figure 15: Syslog Filter Table you can see Syslog Filter list together with some filter examples. As
you can see, each filter has:

1. Filter number

2. Description

3. Filter expression – condition for the filter expressed in text format

4. Filter action - reject or accept messages that match filter expression

5. Status – filter can be active or inactive

Looking at the second filter named “Block Fan” you can see that it is used to block (reject) fan
related logs (log message contains the word “fan”) of low priority (severity levels between 3 and 7)
from any device.

Filter table is ordered which means that filters are applied in the order of the table: filter with the
filter number 1 will be applied first, then rest will follow. Note that default filter is always the last one
to be applied.

Ordering and Default filter allows you to have two filter strategies:

Explicit reject: default filter accepts all messages, filters reject specific messages

Explicit accept: default filter rejects all messages, filters accept specific messages

Default filter is always active, always the last to be applied, and the only change you can
make to it is to change its Filter action (to accept or reject all messages).

Filter table has several quick options:

1. To make a filter active/inactive,


click the Inactive/Active icon

2. To edit filter, click the edit icon., or


double click on the filter table row

3. To remove filter, click remove icon

4. To change the position of the filter


in the table, use the Up and Down
icons

To Add a new filter, click the Add button at the top of the Filter table.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 203


Filter expression is a set of conditions that need to be met in order for filter action to be triggered.
Condition are based on the syslog message severity, facility, message content or device(s) that
sent it (based on source IP address). Each condition type has several condition operands
depending on the possible values, for instance Severity has options >, <, =, !=, >=, <= and
“between” operands.

The conditions are added by clicking on the “+” icon and composite conditions are added by
clicking on the “+()“ icon. Composite conditions will appear in the filter expression in the brackets,
and are generally used if you need a condition in the form of Cond1 AND (Cond2 OR Cond3).

Logical operator between condition are set by the drop-down list next to “+” and “+()” options:
Match All (AND), Match Any (OR), Match None (NAND).

By default, filter action is set to Accept and filter status to Active.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 204


EventLog Alarm Settings
EvenLog users can view and EventLog administrator can add, edit or delete alarms.

To set EventLog alarms, go to > Settings > EventLog Settings > Alarms.

To add a new alarm in EventLog:

1. Click Add
2. Set Alarm information (type, name, description and level)
3. Set Alarm threshold
For Syslogs, threshold is based on source IP, severity, facility and message content
For SNMP traps, threshold is based on source IP, OID and variable bindings.
It is possible to combine more threshold criteria (AND logical operand is implied).

If you do not define a value to a certain criterion, that criterion will not be included in the Alarm
condition.

Screenshot above shows an example of an Alarm confguration. This alarms will trigger if syslog
message is sent from 147.91.7.65, with severity level 3 and message containing Authentication
failure.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 205


Eventlog System Settings
To access NetVizura EventLog settings go to > Settings > EventLog Settings >
On this page:
Configuration.

Service Options
Database
Maintenance

You have the option to configure:

1. NetVizura EventLog service options

2. Syslog database maintenance options

3. SNMP Trap database maintenance options

Service Options
To access Service options, go to > Settings > EventLog Settings > Configuration.

In service options you can set listening port for syslog and trap messages, and view preferences.

To set Syslog socket port, change the value in the corresponding text field and click Save. Note
that devices exporting syslog messages need to target this port (explicitly or via redirection).

To set Trap socket port, change the value in the corresponding text field and click Save. Note that
devices exporting trap messages need to target this port (explicitly or via redirection).

By default, syslog messages are exported from the devices to port 514, while NetVizura
listens on the port 33514 in Linux systems and on the port 514 in Windows systems. If
you use Linux systems, you need to (1) redirect syslog messages to the 33514 on
NetVizura server, (2) export syslog messages to 33514 from device, or (3) change
NetVizura EventLog configuration. Same applies to trap socket port.

Maximal severity level shown is by default set to 3 – Error which means that when you open
EventLog module severity levels 0, 1, 2, 3 will be active in the Severity Table. To change the value,
click on the drop down menu and choose a different value.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 206


Database Maintenance
To access Database Maintenance, go to > Settings > EventLog Settings > Configuration.

On screenshot above you can see an example of database maintenance configuration: cleanup is
triggered after every 10,000 messages and the cleanup service will delete messages that are
either more than 120 old, or the oldest messages if the database size is more than 20GB.

To change database maintenance parameters, edit the corresponding text fields and click Save.

Setting the Keep messages in database for parameter to zero will switch off deletion of
the messages in regards to their age. In other words, cleanup service will only delete
messages if the maximum database size is exceeded.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 207


MIB Settings
To access it, go to > Settings > MIB Settings (upper right corner of the application).

You are able to set MIB modules, SNMP queries and search options.

MIB Module Settings


MIB Option Settings

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 208


MIB Module Settings
On this page:
In order to populate the MIB Tree and be able to send SNMP requests to devices, OID definitions
need to be in the application database. If the MIB Tree does not have OIDs you need, you need to
add the module that defines them. Adding MIB
Module
To access MIB Modules, go to > Settings > MIB Settings > Modules. Bulk MIB Module
Import
Removing MIB
Module

On the screenshot to the left we can see MIB module table together with default MIBs. As you can
see, table shows basic MIB parameters:

1. Name
2. Release date
3. Imports

Looking at the first MIB named “xxxx” we can see that it was released on 6th of January 1994 and
that its imports mib-2 located in the MIB called RFC1213-MIB. This means that in order for
BGP4-MIB to be added to the database, RFC1213-MIB had to be added before that.

Adding MIB Module

To add a new MIB module, click the + Add button at the top left of the Module table.

If you try to add a MIB and it fails,


the application will show a list of
imports needed for that MIB and
the missing MIBs will be marked
red.

For instance, if you want to add


CISCO-CLASS-BASED-QOS-MIB you will
have to add HCNUM-TC first. If you do not,
you will get the message shown on
screenshot to the right.

Bulk MIB Module Import

When importing, multiple MIB Module files may be chosen for import. All selected files will be
imported successfully in case MIB Modules, you are importing, have not yet been uploaded. If that
is not the case, appropriate dialog will be displayed, and you will be asked to resolve existing MIB
Module conflicts. By default, the module you are trying to import will be selected for import, only if it
is newer revision comparing to the module already in database. On the other hand, if the module
you are trying to import has unknown or older revision comparing to one already in database, you
can resolve import conflict by choosing the revision of the module you want to keep.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 209


From compatibility reasons it's always good to have the latest available
revision of the module installed.

Make sure not to select multiple MIB Module files with the same name when
importing modules in bulk. In that case, there is no guarantee which module
will be imported.

Removing MIB Module

To remove a MIB, click - (remove icon) in the Action column.

If some other MIB Module depends on the module you are trying to remove, application will show a
list of all dependent modules and you will not be able to remove selected module until you remove
all dependent modules. Otherwise, remove action will be successful.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 210


MIB Option Settings
To access MIB options settings go to > Settings > MIB Settings > Configuration.

You have the option to


configure:

1. Search results
2. List response
limit
3. Table response
limit

Search results sets the limit to the number of results returned using the Search option. When the
number of found OIDs reaches the limit set here, the Search action will stop.

List response limit sets the limit of OID values returned and showed on a page as a result of
SNMP request on a MIB tree element. When the number of found OID values reaches the limit set
here, the SNMP walk will stop and the found OID values will be displayed. This limit is used to
break very large SNMP request into several smaller ones.

For example, if you click Request on the MIB tree element that can return 200 OIDs and the List
response limit is 50, in view mode first 50 results will show. When you click the Next button above
the table, next 50 results will show etc. Effectively, this SNMP request has been broken down into
4 smaller SNMP requests.

If a MIB tree element is a table List response limit is ignored.

Table response limit sets the maximum number of table rows shown on a page as a result of
SNMP request on the MIB tree element that is a table. Result of the request will be shown as a
table with multiple columns and successive rows are displayed by clicking on the Next button
above the table.

For example, if you have a MIB table containing 1000 OIDs organized in the 5 columns, we will
have in total 200 rows. If the Table response limit is set to 50 then the resulting table after a SNMP
request will shows first 50 rows (containing 5 x 50 = 250 OIDs). When you click the Next button
above the table, next 50 rows will show etc. Effectively, a very large table is shown in 4 steps.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 211


Troubleshooting
General Troubleshooting
NetVizura is slow
Web interface not running (Linux)
How to recover from Exception caught: 500 The call failed on the server
How to recover from RPC failure error
How to restart the application
How to submit a request
NetFlow Troubleshooting
No NetFlow traffic captured
Performance issues related to End User traffic
EventLog Troubleshooting
I do not receive any Syslog messages
I set the Syslog socket port to 514 but I am still not receiving syslog messages
(Linux)
MIB Troubleshooting
SNMP request lasts too long
SNMP request fails on a device
I can not add a MIB to Modules
I can not find an OID in the MIB tree
I can not set the OID value on a device

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 212


General Troubleshooting
NetVizura is slow
Web interface not running (Linux)
How to recover from Exception caught: 500 The call failed on the server
How to recover from RPC failure error
How to restart the application
How to submit a request

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 213


NetVizura is slow
Problem

NetVizura is slow: long time for loading graphics, tables etc.

This usually happens if RAM is not allocated to NetVizura services: PostgreSQL and Tomcat. After
installation it is needed to tweak the configuration files in order to utilize the installed RAM to the
fullest extent.

Solution

To tweak PostgreSQL and Tomcat memory allocation follow the


instructions on links below:

1. For DEB Linux installation: Linux DEB (Debian&Ubuntu)


Installation#Postinstallsteps
2. For RPM Linux installation: Linux CentOS Installation#PostInstallSteps
3. For Windows installation: Windows Installation#PostInstallSteps

If the memory is already fully allocated, add more memory to the server and re-tweak
PostgreSQL and Tomcat to use the extra memory.

Related articles

Page:How to restart the application


Page:Web interface not running (Linux)
Page:No NetFlow traffic captured
Page:How to recover from Exception caught: 500 The call failed on the server
Page:NetVizura is slow

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 214


Web interface not running (Linux)
Problem

Web interface is not responding.

Solution

Web interface is started via browser using Tomcat and PostgreSQL service. The interface is
access by typing http://netvizura_server_ip:8080/netvizura.

Follow these steps:

1. Check if your IP is correct


2. Check if port 8080 is open on the NetVizura server
3. Check if tomcat service is up (using top command)
1. if not, try to start it (service tomcat6 start)
2. if it can not be started check which services are installed:
1. The listing of /etc/init.d

2. The listing of command service --status-all


3. The listing of command chkconfig –list
4. Check if PostgreSQL is up (service postgresql-9.3 status)
1. if not, try to start it: service postgresql-9.3 start

Note

tomcat6 and postgresql-9.3 are examples of Tomcat


and PostgreSQL installation. Name of services and their
versions on your server may differ.

If the problem persists please contact us at [email protected] and send us the


following:

1. On which virtual (or physical) platform have you installed NetVizura


(VMWare Workstation, Proxmox, Xen, physical machine...)
2. The listings of commands ran in step 3.b. above
3. Entire zipped directory /var/log/tomcat6/
4. File /var/log/pgsql
5. Entire zipped directory /var/lib/pgsql/9.3/data/pg_log/
6. Entire zipped directory /var/log/netvizura/

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 215


How to recover from Exception caught: 500 The call failed on the server
Problem

When trying to login, application displays the following error: "Exception caught: 500 The call failed
on the server". This can happen if the browser window with the application stayed open during
update or if the browser session has expired or if database is not running.

Linux Solution

1. Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.

If this doesn't work, access the server via ssh and execute the following commands:

1. Check the status of database and start the postgresql service


1. service postgresql-9.3 status

2. service postgresql-9.3 start

2. Restart tomcat6 service (to register the application on the database)


1. service tomcat6 stop

2. service tomcat6 start

Info

Names of Tomcat and PostgreSQL services in these article are an example. Check
which version of these services are installed on your server and use those names in the
commands listed above. For example, if you have installed Tomcat 7 the command 2a
will be service tomcat7 stop

Windows Solution

1. Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.

If this doesn't work, do next:

1. Start the postgresql service


1. In Windows Command Prompt or PowerShell execute the following commands: n
et start postgresql-x64-9.5
2. Restart tomcat service (to register the application on the database)
1. Double click on Apache Tomcat Properties in system tray. In General tab, click St
op to stop tomcat service.
2. Click Start to start tomcat service.

Info

Version 9.5 of PostgreSQL service in these article is an example. Check which version
of this service is installed on your server and use this name in the commands listed
above. For example, if you have installed Postgresql 9.4 the command 2b will be net
stop postgresql-x64-9.4

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 216


How to recover from RPC failure error
Problem

Application displays RPC failure error. This happens if session has expired in browser you use to
access the application.

Solution

Refresh browser (Ctrl+F5) and then log in again OR log out and log in manually.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 217


How to restart the application
Problem

Application is not collecting or processing data (syslog, netflow). This is manifested by empty
charts and presence of dropped packets in System view of the corresponding application module.
This can happen due to low memory, power outage on the server.

Linux Solution

Access the server via ssh and execute the following commands:

Execute commands in strict order to avoid improper application restart. Tomcat service
must be started after PostgreSQL for instance.

1. service tomcat6 stop

2. service postgresql-9.5 stop

3. service postgresql-9.5 start

4. service tomcat6 start

Check the names of your services before attempting stop and start commands.. Names
of Tomcat and PostgreSQL services may differ on different installations. For Example
Tomcat may be tomcat6 or tomcat7 and PorstgreSQL may be postgresql-9.2 or higher.

Windows Solution

Execute commands in strict order to avoid improper application restart. Tomcat service
must be started after PostgreSQL for instance

1. Stop tomcat
Double click on Apache Tomcat Properties in system tray. In General tab, click Stop to
stop tomcat service.

2. Stop postgresql
Open Command Prompt or Windows PowerShell and type: net stop
postgresql-x64-9.5

3. Start postgresql
net start postgresql-x64-9.5

4. Start tomcat
In General tab of Apache Tomcat Properties, click Start to start tomcat service.

Info

Version 9.5 of PostgreSQL service in these article is an example. Check which version
of this service is installed on your server and use this name in the commands listed
above. For example, if you have installed Postgresql 9.4 the command 2b will be net
stop postgresql-x64-9.4

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 218


NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 219
How to submit a request
Contact Us On this page:
If you need to report a problem, request a new feature or ask for help, you can contact NetVizura
team in two ways: submit a customer request on our Support portal or email us. Contact Us
Customer
1. Customer Portal Portal
Email
Go to web page http://jira.netvizura.com/servicedesk/customer/portal/1 and login to your Submit a Problem
account.

Here you can see previous request tickets, their statuses and correspondence. You will get
notified on status changes and NetVizura team replies via email.

If you don not have an account:

1. Send initial email to [email protected]


2. You will receive automatic reply with the link to the portal page
3. Enter password to complete registration and enter your account

2. Email

Send an email to [email protected]. This will automatically open a ticket on our


Customer Portal. After support agent reviews your request, you will receive notification
reply that support ticket is in progress.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 220


You can continue to reply via email (ticket will be updated automatically) or start using
the Customer Portal.

Please do not change the Subject line (eg. "[JIRA] (NetVizura Support) Houston, we've
had a problem! |NVSUP13] "). This will ensure that all relevant information (emails,
comments etc.) are synchronized with the ticket on our Customer Portal.

Submit a Problem

Before submitting a problem, please try to find a solution in the search box provided at http://jira.ne
tvizura.com/servicedesk/customer/portal/1.

If none of the provided resources help, we kindly ask you to send necessary information so that we
can quickly analyze, diagnose and provide solution to your problem:

1. Summary and Description of problem


2. Version and Build of the application (About in the upper right corner of the applicaiton)
3. Screenshot of the problem
4. System logs ( whole directory, not just the last file)
1. For Linux: /var/log/tomcat6(7)
2. For Windows: C:\Program Files\Apache Software
Foundation\Tomcat 7.0(8.0)\logs
5. System tab > Performance, Flow screenshots (if problem is performance related)
6. Environment
1. HW: CPU, RAM, HDD (if problem is performance related)
2. SW: OS, Java, PostgreSQL, Tomcat, browser (if problem is dependence related)
7. Priority (optionally)

Example:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 221


NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 222
NetFlow Troubleshooting
No NetFlow traffic captured
Performance issues related to End User traffic

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 223


No NetFlow traffic captured
Problem

NetFlow export is started on the devices but there is no NetFlow traffic in the application.

Solution

NetFlow traffic may not show due to several reasons:

Firewall and access lists are blocking netflow packets


Collection port is not opened
Collection port has already being used by a different application
Bad netflow exporter configuration
Aggregation filter is filtering out the traffic
License has expired
NetFlow packets are being dropped

To determine the cause and solution please do the following:

General steps:

Go to System tab in the application

1. check the Packets chart (netflow packets that the application


collected)
1. f there are no UDP packets received go to steps 1 to 2.
2. if there are dropped packets restart Tomcat service for
temporary quick fix and go to step 1c to resolve the core
problem
2. check Flows chart:
1. if there are no flows this means that no netflow data is
received by the application, go to steps 1 to 2.
2. if all flows are unlicensed, your license is invalid or expired
- contact us for resolving this
3. if all flows are filtered, go to > Settings > NetFlow
Settings > Aggregation filtering and remove the filter
rejecting all flow
4. if all flows are dropped, try restarting the tomcat service
and contact us if the problem persists
3. check Performance chart:
1. if Heap utilisation is high try adding more RAM to Tomcat
and PostgreSQL services (consult Post installation steps)
2. if DB write time is high try adding more CPU cores to the
server
3. if you are not sure what to do contact us at support@netviz
ura.com

Linux:

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 224


1. Check if NetFlow data is received by the server
1. in command shell on the server execute tcpdump port 2055 co
mmand - you should see steady stream of packets received by the
server (2055 is the default NetFlow port)
1. if there is no netflow packets check your firewalls, access
lists to enable packets to be received by NetVizura server;
2. in command shell on the server execute watch -n1 "ls -l
/var/lib/netvizura/flow/temp" - after several seconds you
should see that tmp.bin file size is increasing
1. if tmp.bin file size is not increasing, but tcpdump shows
that netflow packets are reaching the server check your
local firewall configuration (usually iptables) or NetVizura
NetFlow Collection port (see below).
2. Check if Collection port on the server is open and that NetVizura is listening
on that port
1. Check that firewall is allowing packets on NetFlow port (the default
is 2055)
1. Execute command service iptables status to view
firewall configuration. There has to be a line present which
is allowing traffic on NetFlow port (2055)
2. Check that NetVizura is listening on NetFlow port
1. Execute command netstat -noap | grep 2055 and
verify that there is a line present similar to following:

udp 0 0
:::2055
:::*
28004/java off
(0.00/0/0)

It is important that java process is the one that occupied


NetFlow port - not some other process. If some other
process already occupied NetFlow port you need to
reconfigure that other process to use a different port.

3. Check that Collection port is accessible outside the NetVizura


server

1. on a remote host execute command nmap


netvizura_ip_address -sU -p 2055 where
netvizura_ip_address is the address of NetVizura server. In
the output of the command you should see that the port is
open.

3. Check netflow exporter configuration


1. Check if netflow device is configured to send netflows to the
NetVizura server IP address and collection port
1. Collection port in NetVizura application can be set in >
Settings > NetFlow Settings > Configuration
2. Default Collection port is 2055
2. Try installing a netflow generator and set it to export data to the
NetVizura server
1. if there is traffic on the chart then netflow exporter
configuration is not good
2. if there is no traffic on the chart, check if the traffic is being
blocked (access lists, firewalls)

Windows:

Using an administrator account on Windows is recommended.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 225


1. Check if NetFlow data is received by the server
a. You should determine if server receives steady stream of packets at 2055
port (2055 is the default NetFlow port) with some packet analyzer for
windows (wireshark, windump, etc)
1. if there is no netflow packets check your firewalls, access
lists to enable packets to be received by NetVizura server;
b. In C:\Program Files\NetVizura\flow\temp after several seconds you should
see that tmp.bin file size is increasing (This is default location for
NetVizura NetFlow installation)
1. if tmp.bin file size is not increasing, but packet analyzer s
hows that netflow packets are reaching the server, check
your local firewall configuration or NetVizura NetFlow
Collection port (see below).
2. Check if Collection port on the server is open and that NetVizura is listening
on that port (the default is 2055)
a. Check that firewall is allowing packets on NetFlow port (the default is
2055)
b. Check that NetVizura is listening on NetFlow port
i. In Windows Command Prompt or PowerShell execute the following
command: netstat -noab and verify that Tomcat process is the one that
occupied NetFlow port 2055. If some other process already occupied
NetFlow port you need to reconfigure that other process to use a different
port.
c. Check that Collection port is accessible outside the NetVizura server
1. on a remote host execute command nmap -sU netvizu
ra_ip_address -p 2055 where netvizura_ip_address is
the address of NetVizura server. In the output of the
command you should see that the port is open.
3. Check netflow exporter configuration
1. Check if netflow device is configured to send netflows to the
NetVizura server IP address and collection port
1. Collection port in NetVizura application can be set in >
Settings > NetFlow Settings > Configuration
2. Default Collection port is 2055
2. Try installing a netflow generator and set it to export data to the
NetVizura server
1. if there is traffic on the chart then netflow exporter
configuration is not good
2. if there is no traffic on the chart, check if the traffic is being
blocked (access lists, firewalls)

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 226


Performance issues related to End User traffic
In general, NetVizura performance primarily depends on the inherited number of counters (nodes)
and number of users you want to monitor. End User traffic does not significantly affect CPU and
HDD usage. However, it may have impact on:

1. RAM usage
2. DB write time increase
3. Shared Syslog database increase

RAM increase

Depending on the RAM availability it increases it more or less (when RAM is less available it can
increase by only a couple of percentages, when RAM is more available it can increase up to
100%).

There is a way to optimize NetVizura RAM usage by increasing Tomcat memory. Read more about
it under "Tomcat Memory Allocation" section within specific Installation article.

DB write time increase

In environments with more than a few hundred End Users, DB write time can have a noticeable
increase. This can significantly degrade application performance (slower displaying of charts,
delayed triggering of NetFlow alarms, loss of data).

This can be solved by changing PostgreSQL configuration. You can find out more about it within In
stallation article under "Tweaking PostgreSQL" section.

Shared Syslog database increase

If you use also NetVizura EventLog Analyzer, End User syslog logon messages share database
storage with the rest of syslog messages and might increase disk usage thus triggering removal of
old syslog messages sooner.

Consider increasing Maximum database size within Syslog Database Maintenance Options.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 227


EventLog Troubleshooting
I do not receive any Syslog messages
I set the Syslog socket port to 514 but I am still not receiving syslog messages (Linux)

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 228


I do not receive any Syslog messages
There are several possible reasons for not receiving syslog messages:

1. Syslog export port and NetVizura Syslog socket port do not match
2. NetVizura server has firewall (port is not opened)
3. Devices exporting syslog and NetVizura server are not connected

Syslog export port and NetVizura Syslog socket port do not match

Syslog socket port in > Settings > EventLog Settings > Configuration needs to match the port
on which you are sending syslog messages. You need to (1) redirect syslog messages to the
33514, or (2) export syslog messages to 33514, or (3) change NetVizura EventLog configuration
so that the export port (devices or redirection) match the Syslog socket port in the configuration.
Check the IP table to see if redirection is applied.

On Linux systems ports lower than 1024 can not be used by application. Tomcat web
server running NetVizura EventLog needs to be started by root user to allow NetVizura
EventLog service to listen on ports lower than 1024.

NetVizura server has firewall (port is not opened)

Port to which syslog messages are exported to (Syslog socket port in > Settings > EventLog
Settings > Configuration) might not be opened during installation process, if so, you need to
manually open that port. Check your software firewall on the NetVizura server and open the port.
Iptables is an example of firewall on CentOS and RedHat systems.

Devices exporting syslog and NetVizura server are not connected

Contact your system and network administrators and make sure that all devices exporting syslog
messages have network connection to the server running NetVizura EventLog.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 229


I set the Syslog socket port to 514 but I am still not receiving syslog messages (Linux)
Problem

Port lower than 1024 on Linux systems can only be used by root.

Solution

If NetVizura doesn't have root privileges then you need to set the port to one higher than 1024 and
redirect the Syslog messages to that port.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 230


MIB Troubleshooting
SNMP request lasts too long
SNMP request fails on a device
I can not add a MIB to Modules
I can not find an OID in the MIB tree
I can not set the OID value on a device

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 231


SNMP request lasts too long
SNMP request can take too long if the number of SNMP request retries and timeout are set to high
for the policy used to access the device.

Go to > Settings > Control Panel > SNMP Policies and check the parameters Retry and Ti
meout for the policy used on the device. You can see witch policy is configured on the device by
going to > Settings > Control Panel > Devices.

For more information, go to chapter Configuring SNMP Policies.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 232


SNMP request fails on a device
There are several possible reasons for SNMP request to fail on a device:

Policy used to access device is wrong


Access list doesn't allow access to the device
SNMP not enabled on the device
Device is not available

Policy used to access device is wrong


A quick way to check if a
policy is working on a
Policy of the device has to match SNMP configuration on that device. Policy is defined in the >
device is to go to > Set
Settings > Control Panel > SNMP Policies. and policy is set to a device in the > Settings >
tings > Control Panel >
Control Panel > Devices. Check SNMP version and Community string first.
Devices, double click on a
device and then clicking on
For further information, go to articles Configuring SNMP Policies and Configuring the Test button.
Devices.

Access list doesn't allow access to the device

Check if the access list allows access to the device from NetVizura server (server's IP has to be
permitted).

Multiple access list might need to be checked.

SNMP not enabled on the device

Check if the SNMP is enabled on the device, if not – enable it.

Device is not available

Device might not be available because network is not working properly, SNMP access is not
permitted or the device is down (no power for instance). Try to ping the device to check it's
availability or contact your network engineers.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 233


I can not add a MIB to Modules
There are two possible reasons for not being able to add a MIB to Modules:

MIB is dependent on other MIBs


MIB has a syntax error

MIB can only be added to Modules if all MIBs that it is dependent on are already added in the
Modules. Application will inform you of the list of missing MIBs. You need to download all the
missing MIBs from the list and add them before trying to add the desired MIB again.

For more info on adding a MIB, go to article Configuring MIB Modules.

In some cases the MIB file can contain syntax error(s) that does not allow the application to pars it.
You can try to fix the file your self, or rise a support case by sending an email to support@netvizur
a.com.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 234


I can not find an OID in the MIB tree
There are two possible reasons for not being able to find an OID in the MIB tree:

OID number or name is mistyped


MIB containing the OID is not in the application database

Double check the OID number or name first.

If this is OK, then you need to add a MIB containing the OID to the application. Download the MIB
(from vendor website for instance) and then add it to the database by going to > Settings >
MIB Settings > Modules.

For more info on adding a MIB, go to article Configuring MIB Modules.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 235


I can not set the OID value on a device
There are two possible reasons for not being able to set the OID value on a device:

Policy used to access device is READ instead of READ_WRITE (application settings)


SNMP configuration on a device itself has no write privileges

To check privileges of a policy go to > Settings > Control Panel > SNMP Policies and
double click on the policy.

If the problem persist, contact your network engineers to check if the SNMP configuration on a
device is READ only.

In order to get the Set OID option, you need to have write or administrator privileges.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 236


FAQ
License FAQ
NetFlow FAQ

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 237


License FAQ
Can I switch from Trial to commercial version without reinstalling
NetVizura?
Yes. Upon purchase you will be given a new license key which will activate modules and features
according to your license pack. This enables you to keep all the data and configuration.

What can I do with the NetVizura Trial version?


NetFlow Analyzer Free Trial was made for evaluation on any network, regardless of network
topology or complexity. Evaluation period is 30 days from the day of installation. NetFlow
AnalyzerFree Trial will process up to 10.000 flows per minute. There are no other functional
restrictions. If you want to extend the evaluation period, please contact us at [email protected]
m

Can I prolong the trial period?


You can find these useful statistics in the System Tab of NetFlow Analyzer. Number of total flows
received, number of flows processed, as well as the number of flows missed due to license
limitation are shown. This data is calculated and refreshed periodically every 5 minutes.

How do I upgrade?
You can find these useful statistics in the System Tab of NetFlow Analyzer. Number of total flows
received, number of flows processed, as well as the number of flows missed due to license
limitation are shown. This data is calculated and refreshed periodically every 5 minutes.

My support period has expired. How do I renew it?


You can find these useful statistics in the System Tab of NetFlow Analyzer. Number of total flows
received, number of flows processed, as well as the number of flows missed due to license
limitation are shown. This data is calculated and refreshed periodically every 5 minutes.

How do I choose a license pack?


You can find these useful statistics in the System Tab of NetFlow Analyzer. Number of total flows
received, number of flows processed, as well as the number of flows missed due to license
limitation are shown. This data is calculated and refreshed periodically every 5 minutes.

How can I buy NetVizura?


Please contact us at [email protected] and we will find the best licensing and payment model
that suites your requirements and business.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 238


NetFlow FAQ
What is an IP flow?
IP flow is an unidirectional stream of IP packets of a certain network protocol, traveling between
two network points. IP flow is identified by the source and destination IP address, source and
destination port, protocol and DSCP field, within a certain period of time. Within an IP flow all IP
packets have identical:

Source and destination IP addresses


IP header protocol number
IP header ToS field (DSCP)
Source and destination ports if the TCP or UDP protocols are used

What is IP flow accounting?


IP flow accounting is a feature of a router enabling it to create IP flows collection, count IP flows
passing through it and to export the traffic via NetFlow® protocol. The collection itself consists of
the following data:

Number of packets in IP flow


Number of bytes in IP flow
Timestamps

What is NetFlow?
NetFlow is a network protocol, developed by Cisco Systems, used for exporting collected IP flow
traffic. This data is exported to a server, where it is collected, processed, aggregated and archived.
It can then be reviewed in a more user-friendly form. NetFlow Analyzer performs all of these
functions. There are numerous NetFlow protocol versions, most important of which are versions 5
and 9. Version 5 is commonly used on most Cisco NetFlow enabled devices. NetFlow version 9 is
the latest version, created to support advanced technologies such as MPLS, IPv6, Multicast,
VLANs, etc.

Which devices support NetFlow?


NetFlow® technology was developed by Cisco Systems, so all of the Cisco IOS routing platforms
can export NetFlow data. From Cisco Catalyst switching platforms, only Catalyst 6500 series
multilayer switches support NetFlow data export. Other vendors are also offering NetFlow-like
capabilities on their network devices. These similar technologies are named differently by different
vendors, for example J-Flow® by Juniper, NetStream® by Huawei, IPFIX® by Nortel etc.

Which versions of NetFlow protocols are supported by NetFlow


Analyzer?
NetFlow Analyzer is based on Cisco NetFlow protocol versions 5 and 9. NetFlow Analyzer also
supports IPFIX. The system is capable of recognizing protocol formats from other vendors, which
are compatible with NetFlow protocol versions 5 and 9 such as Juniper J-Flow, Huawei NetStream.

However, NetFlow Analyzer has been tested to support NetFlow enabled Cisco devices and IPFIX
from Juniper devices only.

NetFlow Analyzer utilizes Traffic Patterns which are based on IP addresses and not on physical
interfaces, this allows NetFlow Analyzer to support netflow probes - software generated
NetFlow-like protocol. One such (free) software is Softflowd, available at http://code.google.com/p/
softflowd/ .

Indirectly, sFlow is supported if you convert it to NetFlow, using free tool such as sFlow Toolkit,
available at http://www.inmon.com/technology/sflowTools.php .

What is the network traffic overhead generated by the NetFlow data


export?
NetFlow data overhead is expected to be less than 0.5% of the total network traffic included in the
charts. This means, for instance, that 1 Mbps user traffic will produce approximately 50 kbps of
additional traffic exported from routers to NetFlow Server.

NetVizura - Network Monitoring Solutions © 2016, SONECO d.o.o. 239

You might also like