<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields? in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735052#M122</link>
    <description>&lt;P&gt;What's showing up at your Flow Collector?&lt;/P&gt;</description>
    <pubDate>Mon, 29 Oct 2018 16:36:03 GMT</pubDate>
    <dc:creator>brford</dc:creator>
    <dc:date>2018-10-29T16:36:03Z</dc:date>
    <item>
      <title>C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3733810#M121</link>
      <description>&lt;P&gt;I have a C9300 running IOS XE v 16.06.03 (CAT9K-IOSXE) and the network-advantage and dna-advantage licenses installed. &amp;nbsp;I am trying to verify that the encrypted traffic analysis, et-analytics, feature is configured and working properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I followed the configuration guide for enabling the et-analytics,&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/nmgmt/b_166_nmgmt_9300_cg/b_166_nmgmt_9300_cg_chapter_01000.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/nmgmt/b_166_nmgmt_9300_cg/b_166_nmgmt_9300_cg_chapter_01000.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;1). &amp;nbsp;Configure an exporter IP and port for the et-analytics&lt;/P&gt;
&lt;P&gt;2). &amp;nbsp;Configured the inactive timer value for 10 seconds&lt;/P&gt;
&lt;P&gt;3). &amp;nbsp;Enabled threat visibility; e.g. interface gi1/0/1, et-analytics enable&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can see the Netflow with the initial data packet (IDP) and sequence of packet lengths and times (SPLT) fields being sent to the configured destination IP/port. &amp;nbsp;When I examine the Netflow data I never see any of the other et-analytics netflow data fields such as byte distribution, and TLS records. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Cisco white paper,&amp;nbsp;&lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf&lt;/A&gt;, says the et-analytics feature will generate Netflow with the additional fields.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there something that I am not doing or missing. &amp;nbsp;I was under the impression that the Netflow would include user-defined fields for byte distribution the TLS data. &amp;nbsp;The Cisco Joy,&amp;nbsp;&lt;A href="https://github.com/cisco/joy" target="_blank" rel="noopener"&gt;https://github.com/cisco/joy&lt;/A&gt;, code is instrumented to process both Netflow v9 and IPFIX data with the additional netflow data fields.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some additional info from the switch is below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco9300# show platform software et-analytics interfaces&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ET-Analytics interfaces&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/8&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/9&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/11&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/12&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/13&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/14&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/15&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/16&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/17&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/18&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/19&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/22&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/23&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;GigabitEthernet1/0/24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ET-Analytics VLANs&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco9300#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;_______________________&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco9300#show flow monitor eta-mon cache&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Cache type: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Normal (Platform cache)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Cache size:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Current entries:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;45&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Flows added:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;316878&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Flows aged: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;316833&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;- Active timeout&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;(&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1800 secs) &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;82&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;- Inactive timeout&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;(&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;15 secs) &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;316751&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IPV4 DESTINATION ADDRESS:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.168.5.131&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IPV4 SOURCE ADDRESS: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;52.84.126.104&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IP PROTOCOL: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TRNS SOURCE PORT:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TRNS DESTINATION PORT: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;50972&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;counter bytes long:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;26159&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;counter packets long:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;33&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;timestamp abs first: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;15:11:18.517&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;timestamp abs last:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;15:13:22.517&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface input: &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Null&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface output:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Null&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;_______________&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco9300#$rm software fed switch active fnf et-analytics-flow-dump&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ET Analytics Flow dump&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;=================&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Total packets received (3254647)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Excess packets received (120035)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(Index:0) 8.8.8.8, 192.168.5.110, protocol=17, source port=53, dest port=48820, flow done=u&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SPLT: len = 3, value = (61184,0)(61184,0)(128,0)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IDP: len = 267, value = 45:20:1:b:96:66:0:0:75:11:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(Index:1) 192.168.5.110, 192.168.5.1, protocol=17, source port=35386, dest port=53, flow done=u&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SPLT: len = 2, value = (10240,0)(128,0)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IDP: len = 68, value = 45:0:0:44:68:7d:40:0:40:11:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(Index:2) 72.21.91.29, 192.168.5.131, protocol=6, source port=80, dest port=56426, flow done=u&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SPLT: len = 2, value = (5123,1280)(128,0)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IDP: len = 840, value = 45:20:3:48:19:a5:0:0:35:6:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(Index:3) 72.21.91.29, 192.168.5.131, protocol=6, source port=80, dest port=56422, flow done=u&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SPLT: len = 2, value = (5123,768)(128,0)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IDP: len = 840, value = 45:20:3:48:e1:85:0:0:35:6:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 17:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3733810#M121</guid>
      <dc:creator>mjtooley</dc:creator>
      <dc:date>2019-08-20T17:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735052#M122</link>
      <description>&lt;P&gt;What's showing up at your Flow Collector?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735052#M122</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2018-10-29T16:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735055#M123</link>
      <description>&lt;P&gt;My Netflow Collector shows that is receiving Netflow messages with the following data types:&amp;nbsp;IP_DST_ADDR, IP_SRC_ADDR, PROTOCOL, L4_SRC_PORT, L4_DST_PORT, BYTES, PACKETS, flow start-mill, flowed-milli, user-defined(44940), and user-defined(44941).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;44940 is the Initial Data Packet (IDP) and 44941 is the Sequence Packet Length Time(SPLT). &amp;nbsp;I never see any that have 44944 nor any of the ones associated with TLS (44945 - 44951)&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735055#M123</guid>
      <dc:creator>mjtooley</dc:creator>
      <dc:date>2018-10-29T16:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735057#M124</link>
      <description>I should have asked what your Stealthwatch Flow Collector was reporting.</description>
      <pubDate>Mon, 29 Oct 2018 16:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735057#M124</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2018-10-29T16:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735060#M125</link>
      <description>&lt;P&gt;I don't have StealthWatch. &amp;nbsp;I am using the NFv9 collector that is part of the Cisco Joy code on Github (&lt;A href="https://github.com/cisco/joy" target="_blank"&gt;https://github.com/cisco/joy&lt;/A&gt;). &amp;nbsp;I added some "printfs" to the code to tell what data types it was receiving and processing. &amp;nbsp; &amp;nbsp;I compared my Wireshark capture with what the Joy code is seeing&amp;nbsp;and the two are consistent. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735060#M125</guid>
      <dc:creator>mjtooley</dc:creator>
      <dc:date>2018-10-29T16:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: C9300 Encrypted Traffic Analysis (et-analytics) - Missing Netflow Data Fields?</title>
      <link>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735081#M126</link>
      <description>Sorry.  I would suggest that since this is a Cisco Stealthwatch Support forum you might try running the Stealthwatch Flow Collector.  It works and we have some diagnostic capabilities there.  You should request support for that open source Joy project via the email alias defined on Github.</description>
      <pubDate>Mon, 29 Oct 2018 17:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/c9300-encrypted-traffic-analysis-et-analytics-missing-netflow/m-p/3735081#M126</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2018-10-29T17:29:45Z</dc:date>
    </item>
  </channel>
</rss>

