Mandatory criteria needed for creating a Traffic Pattern is the IP address criteria. Namely, it is mandatory to enter at least one address range in the Internal Address range field.
Also, it is possible to set up additional filters using the include and/or exclude commands. Additional filters are based on:
Exporter and its interfaces
Service
AS
Protocol
QoS
Next Hop
These filters can be freely combined to make very specific Traffic Patterns which are matching the traffic you are interested in. For instance, by combining first three filters, you can monitor the traffic from a single network device that uses a specific service in communication with a specific Autonomous System.
On this page: Related pages: |
Bare in mind that this filters are for fine-tuning your Traffic Patterns. In particular, this means that the filter is applied only to the traffic matched by a given Traffic Pattern IP address range. In other words, an IP address from the Traffic Pattern definition is applied first, and then the filters are applied. Therefore, if you want to monitor all traffic that goes from your internal network via certain exporter/service/AS/protocol/QoS, you need to apply that filter to a Traffic Pattern that covers all traffic (such as All traffic Traffic Pattern). Likewise, if you want to monitor the traffic from a particular Traffic Pattern via certain exporter/service/AS/protocol/QoS, apply that filter to that Traffic Pattern. |
To create a filter based on the IP address of the exporter or its interface:
You can monitor the traffic that has been exported by a single device (exporter) or that has entered/exited a specific interface of that particular device (exporter).
The Exporter IP field is used to specify the IP address of the exporting device, while Interface In and Interface Out fields are used to specify the SNMP ID of one or more interfaces of the device. Use the Include and Exclude options to include or exclude several interfaces of the exporter from the filter.
This filter is most commonly used to remove duplicate flows. Read more at Resolving Duplicated Export. |
To cancel any changes to the filter, click Reset. |
An Exporter filter example is given on the figure below: the Traffic Pattern with this filter will only match flows that pass through exporter X.Y.4.38 and only if the flow passed through interface 2 in ingress (In) direction and passed through interface 5 in egress (Out) direction.
|
Example 1
We want to monitor all traffic exported by a network device with the IP address 10.1.1.1. Furthermore, we are only interested in the traffic that has entered through interfaces with SMNP IDs 1 or 2 and exited through interface 4.
Here is how to make the filter:
Click Add
This filter translates to “traffic must pass through router 10.1.1.1, entering through interface 1 or 2, and exiting through interface 4”. |
Example 2
We want to monitor all traffic from a single physical link. This link is on a network device with the IP address 10.1.1.1, interface with SMNP ID 1. This means that interface 1 is both In and Out interface. The device is an exporter.
Here is how to make the filter:
Leave the Interface Out field empty
Do not set Interface Out field to 1 here. This would make an invalid filter, since flow can not enter and extit the exporter on the same interface at the same time. |
This filter translates to “traffic must pass through router 10.1.1.1, entering through interface 1, or pass through router 10.1.1.1, entering through interface 1”. |
Example 3
To monitor the traffic that entered through the Interface with SNMP ID 1 on any/all exporters:
Exporter table added an entry "Exporter IP: all Interface In: 1". This indicates that interfaces In with the SNMP ID 1 of all network devices are included in this filter. |
Example 4
To exclude the traffic entering through a specific interface on a specific exporter:
Exporter table added an entry Exporter IP: 10.1.1.1 Interface In: 1 Interface Out: all and that Exclude and Include radio buttons are disabled, while the Exclude radio button is active. This indicates that the only traffic that will be excluded from the Traffic Pattern will be the traffic entering through the Interface 1 on the network device with the IP address 10.1.1.1. |
To create a filter based on the service:
You can filter traffic based on services by including or excluding one or more service ports. Filtering is done by inserting service port numbers for the source and destination AS. This enables you to monitor the traffic utilizing certain service ports or services only.
Screenshot below shows the an example of service filter.
If you do not know the service you wish to include/exclude, go to Settings > Display Names > Service tab and do a search on the desired service port. |
Example
We want to monitor all traffic exported by a network device with IP address 10.1.1.1. Furthermore, we are only interested in the traffic that has entered through interfaces 1 and 2 and exited through interface 4:
To cancel any changes to the filter, click Reset. |
You can filter traffic based on AS, by including or excluding one or more Autonomous Systems. Filtering is done by inserting AS numbers (ASN) for the source and destination AS. This enables you to monitor the traffic between going to or coming from a certain AS or AS group and the traffic between two AS or AS groups.
Screenshot below displays an example of AS filter:
|
You can filter the traffic based on the protocol, by including or excluding one or more protocols. Filtering is done by inserting protocol numbers into the Protocol Number(s) field. This enables you to only monitor the traffic including a certain protocol or protocols, or to monitor the traffic excluding a certain protocol or protocols.
This screenshot shows the configuration of the protocol filter:
If you do not know the Protocol Number of the protocol you wish to include/exclude, go to Settings > Display Names > Protocol tab and do a search on the desired protocol name or locate the protocol in the Protocol table. |
You can filter the traffic based on QoS, by including or excluding one or more QoS markers. Filtering is done by inserting the ToS field into the ToS list field. This enables you to only monitor the traffic including or excluding a certain level(s) of QoS, or in other words including or excluding certain ToS fields.
The configuration of the QoS filter:
If you do not know the exact ToS for the QoS level you want to monitor, go to Settings > Display Names > DSCP tab and locate the desired DSCP number in the table. |
You can filter the traffic based on next hop, by including or excluding one or more next hop IP addresses. Filtering is done by inserting the IP address for next hop field into the Next Hop IP field. This enables you to monitor only traffic including or excluding a certain next hop.
The configuration of the Next hop filter:
A case when the Next Hop filtering is particularly useful is when the network architecture and configuration forces you to have double netflow export. This situation is further explained in the article Manual Deduplication. |