<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA: exporting netflow over IPsec vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127371#M394897</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both Jorge and Jack for youyr feedback.&lt;/P&gt;&lt;P&gt;Jorge: our netflow collector is included in the encryption domain and we started to declare it as inside (even if it's not true), but we got no packets on the other side of the tunnel.&lt;/P&gt;&lt;P&gt;Jack: I don't understand what you did. Did you write netflow informations into the syslog and then you exported the syslog to the netflow collector?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment we used the threat-detection feature in order to see rough informations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;mc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Dec 2012 07:19:08 GMT</pubDate>
    <dc:creator>psmidcnss</dc:creator>
    <dc:date>2012-12-06T07:19:08Z</dc:date>
    <item>
      <title>Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127368#M394893</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;we have a Cisco ASA 5510 8.4, this device is reachable through a lan to lan IPsec vpn. &lt;/P&gt;&lt;P&gt;We are able to activate the netflow export (we see flow export counters incrementing), but the flow is not passing through the vpn. Our netflow collector is on the other side of the IPsec tunnel so we define it linked to the internet interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My questions are: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Is the export possible through the vpn? I read in a Solarwinds forum that it should not be possible.&lt;/P&gt;&lt;P&gt;- What ip address is choosen as source interface by ASA? Is there a way to force a source interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Marco Canova&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127368#M394893</guid>
      <dc:creator>psmidcnss</dc:creator>
      <dc:date>2019-03-12T00:30:31Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127369#M394895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem with ipsec is that it encrypts traffic and netflow can not be encrypted (later "fixed" by Cisco by implementing flexible netflow for IOS).&amp;nbsp; I don't recall if this was fully implemented for ASA however.&amp;nbsp; What I've done is pipe syslogs instead into my netflow analyzer and use that (much more data and info).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source interface is going to be whatever interface is facing the netflow collector (you define this when you set up the server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #4700b8; font-family: Arial, sans-serif; "&gt;flow-export destination inside&lt;/STRONG&gt;&lt;CODE&gt;&lt;SPAN style="font-family: Arial, sans-serif;"&gt; IPAddress Port&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN style="font-family: Arial, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 17:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127369#M394895</guid>
      <dc:creator>Jack Leung</dc:creator>
      <dc:date>2012-11-30T17:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127370#M394896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to Jack !&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netflow traffic can be exported through VPN tunnels in ASA at least&amp;nbsp; seen in version 8.2.5 / or 8.4.4 as I have seen it . You need to make sure your Netflow collector IP address is part if your interesting traffic of your IPsec tunnel policy.&amp;nbsp; And as Jack indicated&amp;nbsp; your flow-export statement should indicate your trusted interface " inside - nameif&amp;nbsp; " follow by the actual IP address of your netflow collector and port number .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2012 18:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127370#M394896</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2012-11-30T18:11:13Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127371#M394897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both Jorge and Jack for youyr feedback.&lt;/P&gt;&lt;P&gt;Jorge: our netflow collector is included in the encryption domain and we started to declare it as inside (even if it's not true), but we got no packets on the other side of the tunnel.&lt;/P&gt;&lt;P&gt;Jack: I don't understand what you did. Did you write netflow informations into the syslog and then you exported the syslog to the netflow collector?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment we used the threat-detection feature in order to see rough informations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;mc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 07:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127371#M394897</guid>
      <dc:creator>psmidcnss</dc:creator>
      <dc:date>2012-12-06T07:19:08Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127372#M394898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We had the same issue on the ASA 8.3(2). We use ManageEngine Netflow Analyzer 9.6 to collect the netflow traffic.&lt;/P&gt;&lt;P&gt;When I raised&amp;nbsp; a ticket with ManageEngine they told me that netflow doesn't work via the IPsec VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 10:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127372#M394898</guid>
      <dc:creator>rustamovea</dc:creator>
      <dc:date>2012-12-06T10:52:31Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA: exporting netflow over IPsec vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127373#M394899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I fear you're right ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 15:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-exporting-netflow-over-ipsec-vpn/m-p/2127373#M394899</guid>
      <dc:creator>psmidcnss</dc:creator>
      <dc:date>2012-12-06T15:42:27Z</dc:date>
    </item>
  </channel>
</rss>

