I want to collect Netflow data from routers at remote sites in my Data Center. I have setup Netflow successfully and am receiving data from the devices local to the server. I have Site-Site VPNs to the remote offices and connectivity to the collector is not an issue. I have configured Netflow on the remote routers to use the IP address of the inside interface to source teh Netflow traffic ( also tested with Loopback interfaces) which should make this interesting traffic just like one would for RADUIS or Syslog. The issue is that the traffic generated does not get encrypted. I checked these message boards and have found others with the same issue but no solutions have been found. I can duplicate this issue on 830,1721,3700 series routers with varying versions of code. Does anyone have any suggestions on how to get the data to the server. Any help would be appreciated.
" to an address that's at the far end of that tunnel. You'll need some routing to do that - eg, a static route:
ip flow-export destination 220.127.116.11 9999
ip route 18.104.22.168 255.255.255.255 22.214.171.124
#2 You might not want to be running netflow on the tunnel, else everything you export through the tunnel will be accounted by netflow then exported through the tunnel... so you'll end up generating a lot of netflow stats about your netflow traffic...
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :