NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX, NSEL and compatible netflow-like protocols to help net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. By visualizing the traffic by network devices, interfaces and IP subnets, net admins can better understand bandwidth consumption, traffic trends, applications, host traffic and traffic anomalies.
• Monitoring network bandwidth on routers and interfaces;
• Monitoring custom traffic on IP subnets and IP subnets groups;
• Monitoring end user traffic (username based);
• Highlighting traffic structure with top talkers: hosts, services, protocols,
conversations, QoS, AS;
• Exploring historical data: charts and flow records;
• Collecting and analyzing Cisco® NetFlow v5 and v9 and standardized IPFIX
(exported by devices from Cisco, Juniper, HP and other vendors).
This enables companies to optimize their networks and applications, plan network expansion, save time needed for troubleshooting and diagnostics and improve security – in turn considerably lowering company operational costs and increasing network team productivity.
Comments and Reviews
We primarily use NetVizura NetFlow Analyzer for network security. It is extremely important for our team to have precise information and good understanding of why issues occur in our network. For example, when our link is overloaded we immediately receive alert from our NMS software. However, this alert is based on total traffic threshold and we need to know the traffic structure in order to discover true reasons behind this sudden increase. NetFlow Analyzer helps us see which institution, application and IPs contributed to the traffic increase. We are also able to dig into the Raw Data and examine flows to gain additional insights. Since most attacks on our network are distributed (DDoS), we are focused on revealing targets and block unwanted traffic with our internal mechanisms.
[Edited by BoJaK, May 26]
As an ISP we regularly have a need for network traffic monitoring, analysis and security. When our customers request ad hoc network traffic listing we are able to provide required information by exporting PDF reports. If some customer wants regular reports, we are even able to schedule automatic report delivery to its email address. Occasionally, we would have to understand our customers behavior and how they use our services. For example, we would check how many of them use additional D3 TV service we also provide alongside internet. With more and more frequent attacks targeting our network in the recent period, we are glad to have such a tool at our disposal. Namely, by quickly identifying Src IP of the attacker we are able to configure BGP community with our providers so we protect our network one step before attach actually reaches our network.