I'm trying to understand what netflow statistics are being show when using sh ip flow top and the sh ip flow top (#) aggregate commands. What I'm looking for is a real-time picture of statistics, not a n accumulation of stats. We have periods of congestion and an alert system setup to notify me when that congestion takes place. I'd like to connect to the router where the congestion is occurring and get a snapshot of the top ten talkers at that moment. However I'm unsure if that is a real time picture or an accumulation of statistics since either the last clear counters or clear ip flow stats command was issued. Can anyone offer some clarity on how netflow's stats are presented?
Using show ip flow top-talkers and match criteria command can be used to display statistics for unaggregated top flows
Using the show ip flow top-talkers command to display the aggregated statistics from the flows on a router for the highest volume applications and protocols in your network helps you identify, and classify, security problems such as a denial of service (DoS) attacks because DoS attack traffic almost always show up as one of the highest volume protocols in your network when a DoS attack is in progress. Displaying the aggregated statistics from the flows on a router is also useful for traffic engineering, diagnostics and troubleshooting.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...