{"id":9734,"date":"2019-09-19T10:00:11","date_gmt":"2019-09-19T14:00:11","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=9734"},"modified":"2022-10-31T08:04:16","modified_gmt":"2022-10-31T12:04:16","slug":"what-is-netflow","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/","title":{"rendered":"What is NetFlow? &#8211; The Complete Guide to Cisco NetFlow Monitoring"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Introduction_to_Cisco_NetFlow\"><\/span><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-9758 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/learn-what-is-netflow.jpg\" alt=\"Learn what netflow is\" width=\"300\" height=\"200\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/learn-what-is-netflow.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/learn-what-is-netflow-140x93.jpg 140w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Introduction to Cisco NetFlow<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The increasing complexity of IT Infrastructure demands extensive network visibility and security. For those who have been working in networking for a while, NetFlow is not a new technology. Cisco created the network protocol &#8220;NetFlow&#8221; many years ago, which became the primary norm for collecting IP traffic information. Net Flow soon found its place within network management by providing valuable data of network performance and traffic analytics.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_NetFlow\"><\/span>What is NetFlow?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/netflow-analyzer\">NetFlow<\/a> is widely used for collecting and analyzing network flow data statistics. This protocol&#8217;s datagram carries information like the source and destination ports, source IP addresses, destination IP addresses, IP protocol, and the IP service type. If we collect flow records from all flow-enabled network devices \u2014 routers, switches, etc. \u2014 we will have an understanding of where network traffic data is coming from and going to, how much traffic is being generated, who is consuming most bandwidth, and more. These data points can be used for anomaly detection, monitoring bandwidth usage, capacity planning, and to validate the effectiveness of QoS policy.<\/p>\n<div class=\"frm-cta\"><a class=\"frm-cta-link\" href=\"https:\/\/www.eginnovations.com\/supported-technologies\/netflow-analyzer\" target=\"_self\" rel=\"noopener noreferrer\">Simplify NetFlow Traffic Analysis and Bandwidth Monitoring \u00bb<\/a><\/div>\n<h2><span class=\"ez-toc-section\" id=\"History_of_NetFlow_and_Versions_Released_Over_Time\"><\/span>History of NetFlow and Versions Released Over Time<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The first NetFlow version 1 was supported in all the initial flow monitoring releases. Versions 2, 3, and 4 were only usable as internal releases. v5 is the most commonly used version because it has a fixed packet format and is still supported by various routers. Versions 7 and 8 had a few improvements and they are no longer in practice. Meanwhile, version 9 is simplified since this version has FNF capabilities enabled and incorporates a dynamic packet format. Nine versions later, NetFlow still gains popularity not only due to its performance in network management, but also as a significant component of security operations.<\/p>\n<p>IPFIX is referred to as NetFlow v10. It&#8217;s an industry-regulated version of the Cisco flow protocol.<\/p>\n<p>The primary output of all these protocol versions is a flow record. This technology has matured over the years and created numerous formats of flow records. The most used flow-record format is version 9, which is a flexible way to record network performance data. It is the foundation of a new IETF standard.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9742 aligncenter\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/what-is-netflow-record.jpg\" alt=\"Netflow record format shows a flexible way to record network performance data.\" width=\"600\" height=\"279\" border=\"0\" \/><\/p>\n<p style=\"text-align: center;\"><em>Understanding a NetFlow flow record<\/em><\/p>\n<p>v9 comes with the Flexible NetFlow packets (FNF), which gives a broader view of what is happening in the network, thereby making it useful for:<\/p>\n<ul>\n<li>Network monitoring<\/li>\n<li>Application and user profiling<\/li>\n<li>Capacity planning<\/li>\n<li>Identifying security anomalies<\/li>\n<li>Network data mining<\/li>\n<li>Network fault troubleshooting<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Why_Use_NetFlow_Key_Applications\"><\/span>Why Use NetFlow: Key Applications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Optimizing_Bandwidth_Utilization_and_Capacity_Planning\"><\/span>Optimizing Bandwidth Utilization and Capacity Planning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9769 alignright\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/optimizing-bandwidth-utilization.png\" alt=\"Bandwidth Utilization\" width=\"125\" height=\"125\" border=\"0\" \/>NetFlow data allows network administrators to view the complete report on the traffic by specific interfaces in the network, specific protocols, and specific applications, which allows them to understand where bandwidth is getting consumed. By identifying the top talkers on the network, network admins can also see who the top consumers of bandwidth are, validate if that is relevant traffic, plan to optimize usage, and help in capacity planning. When using cloud applications, such as Office 365, Internet usage is likely to go up in organizations. Analysis of network traffic will let network admins know which application access has contributed to increased bandwidth, so they can understand the impact of Office 365 and such cloud applications on network bandwidth.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Enhanced_Network_Visibility\"><\/span>Enhanced Network Visibility<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9772 alignleft\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/enhanced-network-visibility.png\" alt=\"Network Visibility\" width=\"125\" height=\"125\" border=\"0\" \/>NetFlow provides complete visibility into the networks. You can specify the traffic sections you would like to monitor based on the tracks provided by flow data. For instance, you can classify Internet HTTP\/S traffic by ports used or separate traffic by the protocol used. This gives network admins the ability to view the bandwidth usage (source and destination of traffic). Also, network admin teams can customize the data according to their need, be it for recording, detailed analysis or proper planning.<\/p>\n<p>From the NetFlow data, network admins can correlate IP addresses with users who accessed them. Using this data, they can quickly predict QoS and allocate resources per user. And they can also prevent exposure of the network to a risk of malware and compromise, thereby getting a clear view of which user communicated with which IP address, which application the user accessed, and so on.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Enabling_Root_Cause_Diagnosis\"><\/span>Enabling Root Cause Diagnosis<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9770 alignright\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/root-cause-diagnosis.png\" alt=\"Root Cause Diagnosis\" width=\"125\" height=\"125\" border=\"0\" \/>NetFlow monitoring facilitates root cause analytics. When a user complains that email is slow, it could be because of a variety of reasons \u2014 a problem in the mail server, capacity problem with the user\u2019s mailbox, or even a problem in dropped packets over the wire. By analyzing NetFlow flow records, network admins can understand the impact of email over the network and see if there are any packet drops or response time issues causing emails or any application access to be slow. This helps with root cause analytics and determining if the network was the cause of application performance slowdown.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Security_Awareness\"><\/span>Security Awareness<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9771 alignleft\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/security-awareness.png\" alt=\"Security Awareness\" width=\"125\" height=\"125\" border=\"0\" \/>Network security is another key application of NetFlow. By monitoring flow data, it\u2019s simple to understand where most of your resources are being used. Various security attacks consume resources, so if any spikes occur in a particular time or location, they can be identified and investigated for a security breach. With advanced NetFlow analysis, these issues can be monitored, recorded, and improved.<\/p>\n<div class=\"footer-author-box\">\n<h4><span class=\"ez-toc-section\" id=\"How_to_EnableConfigure_NetFlow\"><\/span>How to Enable\/Configure NetFlow<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Here are some helpful resources to help you configure NetFlow on your network devices:<\/p>\n<ul style=\"margin-bottom: 0;\">\n<li><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/netflow\/configuration\/15-mt\/nf-15-mt-book\/get-start-cfg-nflow.html\">NetFlow Configuration Guide from Cisco<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=TZUW5lqzZDc\">How to Configure NetFlow on Cisco Routers and Switches<\/a><\/li>\n<\/ul>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Collect_NetFlow_Data\"><\/span>How to Collect NetFlow Data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Typically network administration teams employ NetFlow monitoring tools for flow data collection and analysis. A NetFlow monitoring tool uses a flow collector to gather network packets and export the flow data from flow-enabled devices. <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/netflow-analyzer\">A NetFlow analyzer<\/a> is then used to process the raw flow data into meaningful insights through visualizations, real-time alerts, and historical reports.<\/p>\n<p>Monitoring NetFlow requires three components:<\/p>\n<ul>\n<li><strong>Flow exporter:<\/strong> a network device (a router or firewall) in charge of obtaining flow data and exports it to a flow collector<\/li>\n<li><strong>Flow collector:<\/strong> a device that collects the exported flow data<\/li>\n<li><strong>Flow analyzer:<\/strong> an application that examines and analyses the flow data collected by the flow collector<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9739 aligncenter\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/10\/netflow-collector.jpg\" alt=\"NetFlow Collector is a device that collects exported flow data\" width=\"617\" height=\"237\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/10\/netflow-collector.jpg 617w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/10\/netflow-collector-300x115.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/10\/netflow-collector-310x119.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/10\/netflow-collector-140x54.jpg 140w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><\/p>\n<p style=\"text-align: center;\"><em>How a NetFlow monitoring tool collects and analyzes flow records<\/em><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Insights_Gained_from_NetFlow\"><\/span>Insights Gained from NetFlow<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9754 alignright\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-insights.jpg\" alt=\"Insights Gained from NetFlow\" width=\"300\" height=\"200\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-insights.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-insights-140x93.jpg 140w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>A NetFlow analyzer obtains different compositions of data from the incoming flow data. You can gain insights such as:<\/p>\n<ul>\n<li>Data about flow records across all the flow-monitored systems<\/li>\n<li>Traffic flows by specific protocol, application, domain, ports, Source, and destination IPs.<\/li>\n<li>Top conversations, addresses, and independent systems<\/li>\n<li>Sources and destinations by geographical location<\/li>\n<\/ul>\n<p>This flow data can help you find out<\/p>\n<ul>\n<li>Who is using forbidden applications?<\/li>\n<li>Who is using significant bandwidth and slowing down the network?<\/li>\n<li>What protocols are heavily used over the network?<\/li>\n<li>Which end points are attacks originating from?<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_eG_Enterprise_Helps_with_NetFlow_Monitoring\"><\/span>How eG Enterprise Helps with NetFlow Monitoring<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/netflow-analyzer\">eG Enterprise<\/a> is an end-to-end IT infrastructure and application performance monitoring solution. With built-in support to monitor a wide array of network devices, eG Enterprise provides monitoring of network availability, performance, configuration changes, and more. With a dedicated <a href=\"https:\/\/www.eginnovations.com\/supported-technologies\/netflow-analyzer\">NetFlow collector and analyzer<\/a> built in, eG Enterprise can tap into flow records and export and analyze them to gain insights into traffic analytics, bandwidth usage, network congestions, top talkers, anomalous traffic spikes, and more. <a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\/free-trial\">Get a free trial of eG Enterprise<\/a> to try NetFlow monitoring in your network. Simplify network troubleshooting with eG Enterprise.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\/free-trial\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13510\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner.jpg\" alt=\"\" width=\"850\" height=\"150\" border=\"0\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner-300x53.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner-800x141.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner-310x55.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/12\/bottom-banner-140x25.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cisco NetFlow The increasing complexity of IT Infrastructure demands extensive network visibility and security. For those who have been working in networking for a while, NetFlow is not a new technology. Cisco created the network protocol &#8220;NetFlow&#8221; many years ago, which became the primary norm for collecting IP traffic information. Net Flow soon [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":9760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[366,471],"tags":[1312,1326,1327,475,720,539,1310,474,1320,1319,1324,719,1322,1323,1311,1318,437,1321,1136,1432,1431,1314,1316,1317,1315,1313,1325],"class_list":["post-9734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-to-end-monitoring-e2e","category-network-monitoring","tag-bandwidth-monitoring","tag-cisco","tag-cisco-monitoring-tools","tag-cisco-netflow","tag-cisco-netflow-monitoring","tag-logicmonitor","tag-net-flow-monitoring","tag-netflow","tag-netflow-analyzer","tag-netflow-collector","tag-netflow-jflow-sflow","tag-netflow-monitoring","tag-netflow-routers","tag-netflow-switches","tag-netflows","tag-network-flow-analysis","tag-network-monitoring","tag-snmp-and-netflow","tag-solarwinds","tag-tool-network-monitoring","tag-tools-network-monitoring","tag-top-conversations","tag-top-flows","tag-top-protocols","tag-top-sources","tag-top-talkers","tag-what-is-netflow"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NetFlow 101 \u2013 Ultimate Cisco NetFlow Monitoring Guide<\/title>\n<meta name=\"description\" content=\"Learn about Cisco NetFlow and how to use it for network traffic analysis. Try the eG Enterprise Cisco NetFlow collector &amp; analyzer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Netflow \u2013 Netflow Monitoring Guide | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"What is NetFlow and what is it used for? Learn all about what NetFlow is and how to monitor it using a NetFlow collector and analyzer. Brought to you by the world\u2019s leader in IT monitoring, eG Innovations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-19T14:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-31T12:04:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-monitoring.jpg\" \/>\n<meta name=\"author\" content=\"Keren Emil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Netflow \u2013 Netflow Monitoring Guide | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"What is NetFlow and what is it used for? Learn all about what NetFlow is and how to monitor it using a NetFlow collector and analyzer. Brought to you by the world\u2019s leader in IT monitoring, eG Innovations.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-monitoring.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keren Emil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NetFlow 101 \u2013 Ultimate Cisco NetFlow Monitoring Guide","description":"Learn about Cisco NetFlow and how to use it for network traffic analysis. Try the eG Enterprise Cisco NetFlow collector & analyzer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/","og_locale":"en_US","og_type":"article","og_title":"What is Netflow \u2013 Netflow Monitoring Guide | eG Innovations","og_description":"What is NetFlow and what is it used for? Learn all about what NetFlow is and how to monitor it using a NetFlow collector and analyzer. Brought to you by the world\u2019s leader in IT monitoring, eG Innovations.","og_url":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2019-09-19T14:00:11+00:00","article_modified_time":"2022-10-31T12:04:16+00:00","og_image":[{"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-monitoring.jpg","type":"","width":"","height":""}],"author":"Keren Emil","twitter_card":"summary_large_image","twitter_title":"What is Netflow \u2013 Netflow Monitoring Guide | eG Innovations","twitter_description":"What is NetFlow and what is it used for? Learn all about what NetFlow is and how to monitor it using a NetFlow collector and analyzer. Brought to you by the world\u2019s leader in IT monitoring, eG Innovations.","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-monitoring.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Keren Emil","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/"},"author":{"name":"Keren Emil","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/6e6a6382a7491a6c5da334e912adb508"},"headline":"What is NetFlow? &#8211; The Complete Guide to Cisco NetFlow Monitoring","datePublished":"2019-09-19T14:00:11+00:00","dateModified":"2022-10-31T12:04:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/"},"wordCount":1211,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-performance-monitoring.jpg","keywords":["bandwidth monitoring","cisco","cisco monitoring tools","Cisco NetFlow","Cisco NetFlow monitoring","LogicMonitor","net flow monitoring","NetFlow","netflow analyzer","netflow collector","netflow jflow sflow","NetFlow monitoring","netflow routers","netflow switches","netflows","network flow analysis","Network Monitoring","SNMP and netflow","solarwinds","tool network monitoring","tools network monitoring","top conversations","top flows","top protocols","top sources","top talkers","what is netflow"],"articleSection":["End-to-End Monitoring (E2E)","Network Monitoring"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/","url":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/","name":"NetFlow 101 \u2013 Ultimate Cisco NetFlow Monitoring Guide","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-performance-monitoring.jpg","datePublished":"2019-09-19T14:00:11+00:00","dateModified":"2022-10-31T12:04:16+00:00","description":"Learn about Cisco NetFlow and how to use it for network traffic analysis. Try the eG Enterprise Cisco NetFlow collector & analyzer.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-performance-monitoring.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2019\/09\/netflow-performance-monitoring.jpg","width":300,"height":200,"caption":"NetFlow Monitoring"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-netflow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is NetFlow? &#8211; The Complete Guide to Cisco NetFlow Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/6e6a6382a7491a6c5da334e912adb508","name":"Keren Emil","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d5e57d310e83b565706d96dd2cac1cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d5e57d310e83b565706d96dd2cac1cd?s=96&d=mm&r=g","caption":"Keren Emil"},"sameAs":["eguser"],"url":"https:\/\/www.eginnovations.com\/blog\/author\/keren\/"}]}},"modified_by":"Review eG","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/9734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=9734"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/9734\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/9760"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=9734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=9734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=9734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}