Rapid growth of IP networks has created interest in new business applications and services. These new
services have resulted in increases in demand for network bandwidth, performance, and predictable quality
of service as well as VoIP, multimedia and security oriented network services. Simultaneously, the need has
emerged for measurement technology to support this growth by efficiently providing the information
required to record network and application resource utilization. NetFlow provides solutions for each of
these challenges.
This SonicOS 5.8.0 feature module guide provides an overview of NetFlow benefits and includes technical
overview of features, details about the NetFlow cache, export formats and NetFlow operation. This docu
ment also provides configuration and troubleshoot procedures and examples.
This document contains the following sections:
• “NetFlow Reporting Overview” section on page 1
• “Administrator Prerequisites” section on page 4
• “Configuring NetFlow Reporting Task List” section on page 5
• “User Configuration Tasks” section on page 12
• “Appendix” section on page 19
-
NetFlow Reporting Overview
This section provides an introduction to the NetFlow Reporting feature. After reading the NetFlow
Reporting Overview section, you will be able to start configuring your SonicWALL security appliance
network interface to enable NetFlow services. This section contains the following subsections:
• “NetFlow Benefits” section on page 2
• “What Is A Flow?” section on page 2
• “NetFlow Export Version Formats” section on page 3
• “NetFlow Export Packet Header Format” section on page 3
• “Supported Interfaces, Encapsulations and Protocols” section on page 3
• “NetFlow Collectors” section on page 4
• “Supported Platforms” section on page 4
• “Supported Standards” section on page 4
SonicOS 5.8 NetFlow Reporting Feature Guide
1
NetFlow Reporting Overview
NetFlow Benefits
NetFlow traditionally enables several key customer applications including:
• Network Monitoring—NetFlow data enables extensive near real time network monitoring capabilities.
Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual
routers and switches as well as on a network-wide basis (providing aggregate traffic or application based
views) to provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.
• Application Monitoring and Profiling—NetFlow data enables network managers to gain a detailed,
time-based, view of application usage over the network. This information is used to plan, understand
new services, and allocate network and application resources (e.g. Web server sizing and VoIP
deployment) to responsively meet customer demands.
• User Monitoring and Profiling—NetFlow data enables network engineers to gain detailed
understanding of customer/user utilization of network and application resources. This information may
then be utilized to efficiently plan and allocate access, backbone and application resources as well as to
detect and resolve potential security and policy violations.
• Network Planning—NetFlow can be used to capture data over a long period of time producing the
opportunity to track and anticipate network growth and plan upgrades to increase the number of
routing devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network
planning including peering, backbone upgrade planning, and routing policy planning. NetFlow helps to
minimize the total cost of network operations while maximizing network performance, capacity, and
reliability. NetFlow detects unwanted WAN traffic, validates bandwidth and Quality of Service (QOS)
and allows the analysis of new network applications. NetFlow will give you valuable information to
reduce the cost of operating your network.
• Security Analysis—NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time.
Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The
data is also a valuable forensic tool to understand and replay the history of security incidents.
NetFlow has two key components: (1) the NetFlow cache or data source which stores IP Flow information
and (2) the NetFlow export or transport mechanism that sends NetFlow data to a network management
collector for data reporting.
What Is A Flow?
A flow is identified as a unidirectional stream of packets between a given source and destination—both
defined by a network-layer IP address and transport-layer source and destination port numbers. Specifically,
a flow is identified as the combination of the following seven key fields:
• Source IP address
• Destination IP address
• Source port number
• Destination port number
• Layer 3 protocol type
• Input logical interface (ifIndex)
These seven key fields define a unique flow. If a flow has one different field than another flow, then it is
considered a new flow. A flow contains other accounting fields (such as the AS number in the NetFlow
export Version 5 flow format) that depend on the version record format that you configure for export.
Flows are processed in a NetFlow cache.
2
NetFlow Export Version Formats
The NetFlow Export datagram consists of a header and a sequence of flow records. The header contains
information such as sequence number, record count and sysuptime. The flow record contains flow
information, for example IP addresses, ports, and routing information. For more information, see
“Appendix” section on page 19
The Version 5 format is an enhancement that adds Border Gateway Protocol (BGP) autonomous system
information and flow sequence numbers. The distinguishing feature of the NetFlow Version 9 format is that
it is template based. Templates provide an extensible design to the record format, a feature that should allow
future enhancements to NetFlow services without requiring concurrent changes to the basic flow-record
format.
Using templates with NetFlow Version 9 provides several key benefits:
• Almost any information can be exported from a router or switch including layer 2 through 7
information, routing information, IPv6, IPv4, multicast and MPLS information. This new information
will allow new applications for flow data and new views of network behavior.
• Third-party business partners who produce applications that provide collector or display services for
NetFlow will not be required to recompile their applications each time a new NetFlow export field is
added. Instead, they may be able to use an external data file that documents the known template
formats.
• New features can be added to NetFlow more quickly, without breaking current implementations.
• NetFlow is "future-proofed" against new or developing protocols, because the Version 9 format can be
adapted to provide support for them and other non-Flow based data measurements.
NetFlow Reporting Overview
NetFlow Export Packet Header Format
In these versions, the datagram consists of a header and one or more flow records. The first field of the
header contains the version number of the export datagram. Typically, a receiving application that accepts
any of the format versions allocates a buffer large enough for the largest possible datagram from any of the
format versions and then uses the header to determine how to interpret the datagram. The second field in
the header contains the number of records in the datagram (indicating the number of expired flows
represented by this datagram) and is used to index through the records. Datagram headers for NetFlow
Export versions 5 and 9 also include a "sequence number" field used by NetFlow data consuming
applications to check for lost datagrams.
Supported Interfaces, Encapsulations and Protocols
NetFlow supports IPv4 (and IPv4-encapsulated) routed traffic over a wide range of interface types and
encapsulations. This includes Frame Relay, Asynchronous Transfer Mode, Inter-Switch Link, 802.1q,
Multi-link Point to Point Protocol, General Routing Encapsulation, Layer 2 Tunneling Protocol,
Multi-protocol Label Switching VPNs, and IP Sec Tunnels.
NetFlow is supported per interface.
NetFlow support for multicast exists on all SonicWALL platforms.
NetFlow supports IPv6 environments in the release of SonicOS 5.8 and up.
SonicOS 5.8 NetFlow Reporting Feature Guide
3
Administrator Prerequisites
NetFlow Collectors
SonicWALL NetFlow collector provides fast, scalable, and economical data collection from multiple
NetFlow Export-enabled devices. The collector consumes flow datagrams from multiple NetFlow
Export-enabled devices and performs data volume reduction through selective filtering and aggregation,
performs bi-directional flow analysis and flow de-duplication.
Supported Platforms
This feature is supported only on the SonicOS 5.8 release. The SonicOS 5.8 release supports the following
platforms:
• TZ series
• NSA series
Supported Standards
SonicOS 5.8 NetFlow Reporting is supported on the following NetFlow Export Formats:
• NetFlow Version 5
• NetFlow Version 9
• IPFIX (NetFlow Version 10)
• IPFIX with extensions
Administrator Prerequisites
NetFlow Activation and Deployment Information
SonicWALL recommends careful planning of NetFlow deployment with NetFlow services activated on
strategically located edge/aggregation routers which capture the data required for planning, monitoring and
accounting applications. Key deployment considerations include the following:
• Understanding your application-driven data collection requirements: accounting applications may only
require originating and terminating router flow information whereas monitoring applications may
require a more comprehensive (data intensive) end-to-end view
• Understanding the impact of network topology and routing policy on flow collection strategy: for
example, avoid collecting duplicate flows by activating NetFlow on key aggregation routers where
traffic originates or terminates and not on backbone routers or intermediate routers which would
provide duplicate views of the same flow information
• NetFlow can be implemented in the SonicOS management interface to understand the number of flow
in the network and the impact on the router. NetFlow export can then be setup at a later date to
complete the NetFlow deployment.
NetFlow is in general an ingress measurement technology which should be deployed on appropriate
interfaces on edge/aggregation or WAN access routers to gain a comprehensive view of originating and
terminating traffic to meet customer needs for accounting, monitoring or network planning data. The key
mechanism for enhancing NetFlow data volume manageability is careful planning of NetFlow deployment.
NetFlow can be deployed incrementally (i.e. interface by interface) and strategically (i.e. on well chosen
routers) —instead of widespread deployment of NetFlow on every router in the network.
4
Configuring NetFlow Reporting Task List
Configuring NetFlow Reporting Task List
The Log > Flow Reporting screen allows you to view statistics based on Flow Reporting and Internal
Reporting. From this screen, you can also configure settings for internal and external flow reporting and
external flow reporting.
Flow Reporting Statistics
The Flow Reporting Statistics apply to all external flows. This section shows reports of the flows that are
sent to the server, not collected, dropped, stored in and removed from the memory, reported and non
reported to the server. This section also includes the number of NetFlow/IPFIX templates sent and general
static flows reported.
NetFlow/IPFIX Packets SentTotal number of IPFIX/NetFlow packets sent to
the external collector.
Data Flows EnqueuedTotal number of connection related flows that is
collected so far.
Data Flows DequeuedTotal number of connection related flows that have
been reported either to internal collectors or
external collectors.
Data Flows DroppedTotal number of collected connection related flows
that failed to get reported.
Data Flows Skipped ReportingTotal number of connection related flows that
skipped reporting. This can happen when running
in periodic mode where collected flows are more
than configured value for reporting.
General Flows EnqueuedTotal number of all non-connection related flows
that have been collected.
General Flows DequeuedTotal number of all non-connection related flows
that have been reported either to external collectors
or internal collectors.
General Flows DroppedTotal number of all non-connection related flows
dropped due to too many requests.
SonicOS 5.8 NetFlow Reporting Feature Guide
5
Configuring NetFlow Reporting Task List
NetFlow/IPFIX Templates SentTotal number of templates that has been reported
General Static Flows ReportedTotal number of static non-connection related
App Flow Reporting Statistics
The App Flow Reporting Statistics apply to all internal flows. Similar to the Flow Reporting Statistics, this
section shows reports of the flows that are sent to the server, not collected, dropped, stored in and removed
from the memory, reported and non reported to the server. This section also includes the number of static
flows removed from the queue, internal errors, and the total number of flows within the internal database.
Data Flows EnqueuedTotal number of connection related flows that have
Data Flows DequeuedTotal number of connection related flows that have
Data Flows DroppedTotal number of collected connection related flows
Data Flows Skipped ReportingTotal number of connection related flows that
General Flows EnqueuedTotal number of all non-connection related flows in
General Flows DequeuedTotal number of all non-connection related flows in
General Flows DroppedTotal number of all non-connection related flows
General Static Flows DequeuedTotal number of non-connection related static
App Flow Collector ErrorsTotal number of internal database errors.
Total Flows in DBTotal number of connection related flows in DB.
to the external collector.
flows that have been reported. This includes lists of
applications/viruses/spyware/intrusions/table-ma
p/column-map/location map.
been queued to internal collector.
been successfully inserted into the database.
that failed to get inserted into the database due to
high connection rate.
skipped reporting.
DB queue.
DB queue.
failed to get inserted due to high rate.
flows that have been successfully inserted into the
DB.
6
Settings
Configuring NetFlow Reporting Task List
The Settings section has configurable options for internal flow reporting, external flow reporting, and the
IPFIX collector. You can also configure the settings for what is reported to an external controller.
• Enable Flow Reporting—This is a global checkbox that enables or disables the complete flow
reporting feature. Selecting this checkbox enables flow reporting, which you can view on the Dashboard
screen. When this is disabled, both internal and external flow reporting are also disabled.
• Report to App Flow Collector—Selecting this checkbox enables the specified flows to be reported to
a flow collector within the SonicWALL appliance. Note that this option is enabled by default and used
for visualization. If disabled, the Flow Monitor and Real Time Monitor on the Dashboard will not
display any flows. You may leave this option disabled if you choose to rely only on external reporting,
rather than SonicWALL visualization.
SonicOS 5.8 NetFlow Reporting Feature Guide
7
Configuring NetFlow Reporting Task List
• Report to EXTERNAL flow collector—Selecting this checkbox enables the specified flows to be
reported to an external flow collector. Some options include another SonicWALL appliance configured
as a collector, a SonicWALL Linux collector, or a third party collector. Note that not all collectors will
work with all modes of flow reporting.
• Enable INTERFACE Based Reporting—Selecting this checkbox enables flow reporting based on
the initiator or responder interface. This provides a way to control what flows are reported externally
or internally. If enabled, the flows are verified against the per interface flow reporting configuration,
located in the Network>Interface screen. If an interface has its flow reporting disabled, then flows
associated with that interface are skipped.
• Enable Firewall-Rules Based Reporting—Selecting this checkbox enables flow reporting based on
already existing firewall rules. This is similar to interface-based reporting; the only difference is instead
of checking per interface settings, the per firewall rule is selected. Every firewall rule has a checkbox to
enable flow reporting. If a flow matching a firewall rule is to be reported, this enabled checkbox will
force to verify if firewall rules have flow reporting enabled or not. This is an additional way to control
which flows need to be reported. Note that this option is applicable to both internal and external flow
reporting.
–
External Flow Reporting Type—If the “Report to EXTERNAL Flow Collector” option is
selected, you must specify the flow reporting type from the provided list in the dropdown menu:
NetFlow version-5, NetFlow version-9, IPFIX, or IPFIX with extensions. If the reporting type is
set to Netflow versions 5, 9, or IPFIX, then any third-party collector can be used to show flows
reported from the device. It uses standard data types as defined in IETF. If the reporting type is
set to IPFIX with extensions, then the collectors that are SonicWALL flow aware can only be used.
The following are recommended options for collectors:
• A second SonicWALL appliance, acting as an external collector
• An external Linux collector running the SonicWALL provided package
8
Loading...
+ 16 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.