<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You're welcome.Please rate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763667#M44651</link>
    <description>&lt;P&gt;You're welcome.&lt;/P&gt;&lt;P&gt;Please rate helpful replies.&lt;/P&gt;</description>
    <pubDate>Sun, 16 Aug 2015 14:14:11 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-08-16T14:14:11Z</dc:date>
    <item>
      <title>analyze netflow record</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763664#M44648</link>
      <description>&lt;P&gt;&amp;nbsp;- Because the sensing interfaces on managed devices do not&amp;nbsp;usually have IP addresses,&lt;/P&gt;&lt;P&gt;the system does not support the direct collection of NetFlow records. how make router to export o/p record to managed device's sensing interface ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- when using nmap active scanning and using custom fingerprint ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763664#M44648</guid>
      <dc:creator>mahmoud.awney1</dc:creator>
      <dc:date>2019-03-10T13:26:18Z</dc:date>
    </item>
    <item>
      <title>the Netflow device reports to</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763665#M44649</link>
      <description>&lt;P&gt;The Netflow device will be generating records which are inspected and parsed as they flow THROUGH a sensor - not to it. So setup the normal Netflow analyzer platform&amp;nbsp;as the flow export destination on the Netflow source device. As long as there's a sensor in the path it will know to parse the data out based on the Network Discovery policy as follows below.&lt;/P&gt;&lt;P&gt;You need to add it in your Network Discovery policy and then re-apply the policy for it to take effect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/fmc_netflow.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 02:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763665#M44649</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-16T02:33:15Z</dc:date>
    </item>
    <item>
      <title>thank you for replay,if i</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763666#M44650</link>
      <description>&lt;P&gt;thank you for replay,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 08:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763666#M44650</guid>
      <dc:creator>mahmoud.awney1</dc:creator>
      <dc:date>2015-08-16T08:22:41Z</dc:date>
    </item>
    <item>
      <title>You're welcome.Please rate</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763667#M44651</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;&lt;P&gt;Please rate helpful replies.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 14:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763667#M44651</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-16T14:14:11Z</dc:date>
    </item>
    <item>
      <title>please, I want to know what</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763668#M44652</link>
      <description>&lt;P&gt;please, I&amp;nbsp;want to know what is the function of customer fingerprint ? and if i customize fingerprint is any other device can detect by using this custom fingerprint ?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 14:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763668#M44652</guid>
      <dc:creator>mahmoud.awney1</dc:creator>
      <dc:date>2015-08-16T14:53:19Z</dc:date>
    </item>
    <item>
      <title>Have you read the User Guide</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763669#M44653</link>
      <description>&lt;P&gt;Have you read the User Guide &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/Enhancing-Discovery.html#pgfId-1599642"&gt;section on using custom fingerprinting&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;I've not seen anyone actually using it since the built-in fingerprinting has shown to be more than adequate in the deployments I've done.&lt;/P&gt;&lt;P&gt;Any custom&amp;nbsp;fingerprints you define&amp;nbsp;will be used by all sensors that have the network discovery policy applied to them.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 15:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763669#M44653</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-16T15:02:20Z</dc:date>
    </item>
    <item>
      <title>already i've read custom</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763670#M44654</link>
      <description>&lt;P&gt;already i've read custom fingerprint from guide but when we define custom fingerprint i write target ip and enter os vulnerability map so i think custom fingerprint used for only target ip and it can't discover another similar operating system.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 17:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763670#M44654</guid>
      <dc:creator>mahmoud.awney1</dc:creator>
      <dc:date>2015-08-16T17:31:02Z</dc:date>
    </item>
    <item>
      <title>If that is the case, you</title>
      <link>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763671#M44655</link>
      <description>&lt;P&gt;If that is the case, you would be best served by opening a TAC case on the issue you are encountering.&lt;/P&gt;&lt;P&gt;As it is designed, it should match that fingerprint to other devices that match the fingerprint. Per the guide:&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12.2360000610352px; line-height: normal;"&gt;When the system sees new traffic from a host that has already been detected and currently resides in the network map, the system updates the host with the new fingerprint information. the system also uses the new fingerprint to identify any new hosts with that operating system the first time they are detected.&lt;/SPAN&gt;"&lt;/P&gt;</description>
      <pubDate>Sun, 16 Aug 2015 17:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyze-netflow-record/m-p/2763671#M44655</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-08-16T17:39:42Z</dc:date>
    </item>
  </channel>
</rss>

