This seems like a bargain.
But very useful info when you need to fingerprint your apps traversin your network.
Below is a sample of using Flexible Netflow with NBAR(match application name).
! flow record rm_1 match application name match ipv4 source address match ipv4 destination address collect interface input collect interface output collect counter packets ! flow monitor mm_1 record rm_1 ! interface gi0/0 ip address 192.168.1.1 255.255.255.0 ip flow monitor mm_1 input ! end
Niciun comentariu:
Trimiteți un comentariu