If you can get a packet format from Extreme I'm sure it wouldn't be
much work to add. It's certainly not NetFlow v1 as defined by Cisco.
NetFlow v1 really should be considered historical. There are no
sequence numbers so you have no idea how well the exporter to collector
path is working.
--
mark
On May 16, 2005, at 1:27 PM, Mike Hunter wrote:
On May 15, "Emmanuel Stavroulakis" wrote:
I am getting the above error, when trying to collect Netflow Records
from an Extreme Alpine 3804 L3 Switch.
It looks like the Extreme only support V1 Flows - so I have changed
the
version to 1 for flow-capute but I am still getting the error.
Anyone had any experience with Extreme Alpine's and flow-capture ?
Any help would he appreciated.
I got a discouraging response from their tech support when I looked
into
this. I have a sinking feeling that they're basically masking their
internal
counters with the filters they make you use and sending you the
results...in other words, you have to know what you're looking for
before
you can start measuring. This could be useful in some limited
contexts,
but it's not the cool netflow experience the kidz love.
They say explicitly that flow-tools doesn't work...I have a feeling
that
their V1 packet is missing some obvious / crucial piece of data and
that
flow-tools is discarding it as invalid. Even if it could be made to
work,
I decided it was too limited to pursue for my purposes.
Mike
-----------------------------------------------------------------------
You cannot use the well known "flow-tools" to examine the data!
You can use:
* tEthereal:
tethereal -n udp port 2055 -w <filename.cap>
* Bare-bones Netflow collector
(http://www.gadgets.co.nz/gadgets/software/bbnfc.shtml):
./bbnfc
The only fields that will update are dPkts and SysUptime. The size of a
Netflow v1 packet is always the same. A customer might think the
packet is
empty because the rest of the packet is filled with zeros. A Netflow
packet
does not show source and destination IP's/ports. That's why
flow-capture
doesn't work.
The source and destination IP will always be 0.0.0.0 because the
filter is
set to match-all-flows. If you would like to capture host or ip range
specific Netflow data, just narrow the filter. If you want to see how
many
packets are coming from IP 10.1.1.1 send to 10.1.1.2 on port 1:1,
adjust the
filter to:
"conf flowstats filter-ingress 1 ports 1:1 export 1 aggregation
destination
10.1.1.2/32 ip-port any source 10.1.1.1/32 ip-port any"
Now you will see 10.1.1.1 as srcIP and 10.1.1.2 as dstIP.
If you use 10.1.1.0/24 as a filter, you will see 10.1.1.0 as srcIP or
dstIP.
_______________________________________________
Flow-tools mailing list
[EMAIL PROTECTED]
http://mailman.splintered.net/mailman/listinfo/flow-tools
_______________________________________________
Flow-tools mailing list
[EMAIL PROTECTED]
http://mailman.splintered.net/mailman/listinfo/flow-tools