Vivek Santuka, CCIE #17621, is a consulting systems engineer at Cisco Systems who focuses on ISE for Cisco’s largest customers around the world. He and I devised, tested and deployed the methodology ...
Several years ago, NetFlow was arguably one of the most underutilized management assets relevant to network performance and security. It was generally available as a part of Cisco IOS software, but ...
I've been scouring around the Internet trying to find the a best practice for monitoring NetFlow a Cisco DMVPN router. I know how to setup NetFlow, my question is what interfaces I would need to ...
Flow data is already generated by most network devices. There has always been sufficient justification to collect and look at flow data if only to get a picture of what your network is being used for.
Constrained network models describe a wide variety of real-world applications ranging from production, inventory, and distribution problems to financial applications. These problems can be solved with ...
AUCKLAND, New Zealand & AUSTIN, Texas--(BUSINESS WIRE)--Packet capture authority Endace today announced EndaceFlow™, a high-performance NetFlow Generator that promotes end-to-end visibility for ...
Leaders at the Tor Project call for calm after an academic paper spells out how funded hackers could use NetFlow data from Cisco routers to de-anonymize Tor users. Tor Project leaders are trying to ...