<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Profiler Queue Size limited warning in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571260#M539677</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the challenge with filtering Netflow for profiling purposes is chance you will not send the critical info needed to classify an endpoint. If newer Netflow code able to filter flows based on specific packet or protocol match, then that would be ideal.&amp;nbsp; Sampled Netflow would certainly increase chance of missing key traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;General best practices include:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Limit Netflow export to specific interfaces where expecting devices of interest.&amp;nbsp; If using to catch anomalous traffic, then look for choke points.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;It is generally better to use a simple flow with minimal key fields like 5-tuple (source/dest ip/port and protocol) to limit the number of individual flow records.&amp;nbsp; &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I do cover some of this in original &lt;A href="http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-30-ISE_Profiling_Design_Guide.pdfhttp://"&gt;ISE Profiling Design Guide&lt;/A&gt;.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Jeff: The first question before enabling Netflow for profiling is "Is there a specific requirement that only Netflow can address".&amp;nbsp; Unless used to detect very specific types of endpoints or events, its use is typically not recommended due to potential of overrunning event queue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Netflow deemed critical for your use case, please reach out to internal Cisco teams for further discussion on how to best address this requirement.&amp;nbsp; If customer requiring this support, please direct request to your local sales team for escalation to internal teams.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Mar 2016 23:48:55 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2016-03-03T23:48:55Z</dc:date>
    <item>
      <title>Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571256#M539574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the following message, what is the significance of the number in Profiler Queue Size Limit Reached : Server=vISE45; Profiler Error Message=16170 Forwarder endpoints dropped;&amp;nbsp; Does it mean 16170 end attribute where dropped?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2016 22:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571256#M539574</guid>
      <dc:creator>Jefkelle</dc:creator>
      <dc:date>2016-03-02T22:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571257#M539607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is the number of events dropped by Profiler since the queue limit was reached.&amp;nbsp; Basically, profiler is receiving more endpoint data than can be processed.&amp;nbsp; Make sure that you don't have excessive profiling data.&amp;nbsp; Best practices include limiting profiling to a single PSN and avoiding SPAN / Netflow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2016 19:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571257#M539607</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-03-03T19:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571258#M539631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any suggestions when if disabling Netflow isn't an option?&amp;nbsp; redundant environment.&amp;nbsp; Some PSNs behind LB, but not all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2016 19:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571258#M539631</guid>
      <dc:creator>jeffery.kelley</dc:creator>
      <dc:date>2016-03-03T19:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571259#M539659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First thing that comes to mind is that some platforms give you the ability to rate-limit the amount of Netflow data sent to the collector.&amp;nbsp; I would look to see if the platform you're using has that ability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2016 19:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571259#M539659</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-03-03T19:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571260#M539677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the challenge with filtering Netflow for profiling purposes is chance you will not send the critical info needed to classify an endpoint. If newer Netflow code able to filter flows based on specific packet or protocol match, then that would be ideal.&amp;nbsp; Sampled Netflow would certainly increase chance of missing key traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;General best practices include:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Limit Netflow export to specific interfaces where expecting devices of interest.&amp;nbsp; If using to catch anomalous traffic, then look for choke points.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;It is generally better to use a simple flow with minimal key fields like 5-tuple (source/dest ip/port and protocol) to limit the number of individual flow records.&amp;nbsp; &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I do cover some of this in original &lt;A href="http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-30-ISE_Profiling_Design_Guide.pdfhttp://"&gt;ISE Profiling Design Guide&lt;/A&gt;.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Jeff: The first question before enabling Netflow for profiling is "Is there a specific requirement that only Netflow can address".&amp;nbsp; Unless used to detect very specific types of endpoints or events, its use is typically not recommended due to potential of overrunning event queue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Netflow deemed critical for your use case, please reach out to internal Cisco teams for further discussion on how to best address this requirement.&amp;nbsp; If customer requiring this support, please direct request to your local sales team for escalation to internal teams.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2016 23:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/3571260#M539677</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2016-03-03T23:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Profiler Queue Size limited warning</title>
      <link>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/4783298#M580102</link>
      <description>&lt;P&gt;For anyone doing a google search for the error and trying to find Craig's link like I was, it has since been moved and looks like it lives here now:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456?dtid=osscdc000283" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-profiling-design-guide/ta-p/3739456?dtid=osscdc000283&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 14:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/profiler-queue-size-limited-warning/m-p/4783298#M580102</guid>
      <dc:creator>ab23</dc:creator>
      <dc:date>2023-02-27T14:40:09Z</dc:date>
    </item>
  </channel>
</rss>

