<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Netflow Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294401#M311328</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do this on the ASA and post result:&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 192.9.200.254 1100 192.9.200.7 9996 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Oct 2013 10:55:08 GMT</pubDate>
    <dc:creator>cadet alain</dc:creator>
    <dc:date>2013-10-16T10:55:08Z</dc:date>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294396#M311317</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the router to forward traffic to my server hosting netflow&lt;/P&gt;&lt;P&gt;My Netflow&amp;nbsp; server IP is 192.9.200.7 and its listening on port 9996&lt;/P&gt;&lt;P&gt;My router IP is192.9.200.254 &lt;/P&gt;&lt;P&gt;and netflow has been enabled with following commands&lt;/P&gt;&lt;P&gt;IP-flow export source gigabitethernet 0/1&lt;/P&gt;&lt;P&gt;IP-flow export version 5&lt;/P&gt;&lt;P&gt;IP-flow export destination 192.9.200.7 9996&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The network is switch ---&amp;gt;cisco ASA----&amp;gt;Router, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is my netflow traffic from the router is not reaching the netflow server hence i cannot get info and am told its the firewall blocking.&lt;/P&gt;&lt;P&gt;Kindly assist and tell me whether my firewall configs are the Problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;banner motd #&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;banner motd # This is Kenya Re network. No unauthorized access is allowed - such access will be prosecuted. Access requests to be forwaded to the ICT Team. #&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SMTP_OUT remark permit outgoing mail from MXserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit ip 192.9.200.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp any host 192.9.200.5 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp 196.200.16.0 255.255.255.0 host 192.9.200.5 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp host 217.21.112.60 host 192.9.200.5 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp host 80.240.192.30 host 192.9.200.5 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp any host 192.9.200.5 eq 993&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp any host 192.9.200.5 eq 995&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit tcp host 41.206.48.74 host 192.9.200.5 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit ip 192.168.205.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit udp any host 192.9.200.7 eq snmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit udp any host 192.9.200.7 eq snmptrap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT_IN extended permit udp any host 192.9.200.7 eq 9996&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging recipient-address &lt;A href="mailto:Firewall@kenyare.co.ke" target="_blank"&gt;Firewall@kenyare.co.ke&lt;/A&gt; level errors&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging queue 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging host inside 192.9.200.7 6/1026&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 192.9.200.20 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-508.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL_OUT_IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.9.200.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username support password Yf12uhqRlWbAtYR. encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username netadmin password Jx0xbhkzRrIpxYnu encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.9.200.7 community private&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community KRE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.9.200.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 172.30.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.9.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 192.9.200.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 41.206.48.74 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 192.9.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294396#M311317</guid>
      <dc:creator>peterramla</dc:creator>
      <dc:date>2019-03-12T02:49:12Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294397#M311320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;no access-list ACL_OUT_IN extended deny ip any any&lt;/P&gt;&lt;P&gt;Please try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 11:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294397#M311320</guid>
      <dc:creator>phuoctrung</dc:creator>
      <dc:date>2013-10-10T11:25:30Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294398#M311323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response i tried that but still no netflow traffic is coming in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing SNMP is not working also what could the problem be ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly assist.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 04:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294398#M311323</guid>
      <dc:creator>peterramla</dc:creator>
      <dc:date>2013-10-15T04:45:00Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294399#M311326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any one with any idea ? Am stuck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 04:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294399#M311326</guid>
      <dc:creator>peterramla</dc:creator>
      <dc:date>2013-10-16T04:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294400#M311327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Did you add the "ip route-cache flow" under interface g0/1 on your router?&lt;BR /&gt;&lt;BR /&gt;Could you also post the output of "show ip flow export."&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 10:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294400#M311327</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-10-16T10:37:22Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294401#M311328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do this on the ASA and post result:&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 192.9.200.254 1100 192.9.200.7 9996 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 10:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294401#M311328</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-16T10:55:08Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294402#M311329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cadet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why you have considered port number 1100 on source port. ,i think for netflow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 11:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294402#M311329</guid>
      <dc:creator>Rohit saurav</dc:creator>
      <dc:date>2013-10-18T11:16:22Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294403#M311330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just took a random port &amp;gt; 1024 like any client would do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 11:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294403#M311330</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-18T11:30:53Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294404#M311331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what valuable finding can we get from mentioned commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 11:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294404#M311331</guid>
      <dc:creator>Rohit saurav</dc:creator>
      <dc:date>2013-10-18T11:49:09Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294405#M311332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you will know if the ASA is permitting Netflow traffic through from outside to inside and if not it will tell you why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 13:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294405#M311332</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-18T13:49:23Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294406#M311333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rohit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; By the output of packet tracer we could confirm if the firewlal rules are allowing or blocking the traffic in different phases of packet processing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further applying captures on firewall ingress interface and egress interface can also be used to verify if the netflow traffic is even reacing the firewall and is getting transmitted across or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use following link for applying captures on ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Naveen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 14:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294406#M311333</guid>
      <dc:creator>narawat</dc:creator>
      <dc:date>2013-10-18T14:07:21Z</dc:date>
    </item>
    <item>
      <title>Netflow Traffic</title>
      <link>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294407#M311334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Peter, are those the only NetFlow commands you have applied on the router? Have you applied "ip route-cache flow" on each interface of the router? Check from the router the output of "sh ip cache flow" and "sh ip flow export" and see if there are actually NetFlow packets in the router cache and other cache stats.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second, since the firrwall configuration seems fine (except for ip any deny, which you said has been removed), have you tried installing WireShark on the NetFlow server and see if it is actually receiving NetFlow packets? If it is, disable the software firewall on your server and give it a shot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;BR /&gt;Don Thomas Jacob &lt;BR /&gt;Head Geek @ SolarWinds - Network Management and Monitoring tools&lt;BR /&gt; &lt;BR /&gt;NOTE: Please rate and close questions if you found any of the answers helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 09:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/netflow-traffic/m-p/2294407#M311334</guid>
      <dc:creator>Don Jacob</dc:creator>
      <dc:date>2013-10-21T09:40:45Z</dc:date>
    </item>
  </channel>
</rss>

