<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic netflow config with eta in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3825146#M157</link>
    <description>&lt;P&gt;&lt;BR /&gt;I have a few stealthwatch questions that I hope the community can help answer.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For the Cat 9300s with ETA enabled, my current netflow config looks like this&lt;/P&gt;&lt;P&gt;flow record SW-RECORD&lt;BR /&gt;match datalink mac source address input&lt;BR /&gt;match datalink mac destination address input&lt;BR /&gt;match datalink vlan input&lt;BR /&gt;match ipv4 ttl&lt;BR /&gt;match ipv4 tos&lt;BR /&gt;match ipv4 protocol&lt;BR /&gt;match ipv4 source address&lt;BR /&gt;match ipv4 destination address&lt;BR /&gt;match transport source-port&lt;BR /&gt;match transport destination-port&lt;BR /&gt;match interface input&lt;BR /&gt;collect interface output&lt;BR /&gt;collect counter bytes long&lt;BR /&gt;collect counter packets long&lt;BR /&gt;collect timestamp absolute first&lt;BR /&gt;collect timestamp absolute last&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the below is the correct config for 9300's with ETA enabled (correct me if I'm wrong)&lt;/P&gt;&lt;P&gt;match ipv4 protocol&lt;BR /&gt;match ipv4 source address&lt;BR /&gt;match ipv4 destination address&lt;BR /&gt;match transport source-port&lt;BR /&gt;match transport destination-port&lt;BR /&gt;collect counter bytes long&lt;BR /&gt;collect counter packets long&lt;BR /&gt;collect timestamp absolute first&lt;BR /&gt;collect timestamp absolute last&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, what kind of issues can arise with the current configuration? Also, should ETA be enabled on ports that connect to cisco access points? I currently use vWLC&lt;/P&gt;</description>
    <pubDate>Sun, 24 Mar 2019 18:16:26 GMT</pubDate>
    <dc:creator>virtualpedia</dc:creator>
    <dc:date>2019-03-24T18:16:26Z</dc:date>
    <item>
      <title>netflow config with eta</title>
      <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3825146#M157</link>
      <description>&lt;P&gt;&lt;BR /&gt;I have a few stealthwatch questions that I hope the community can help answer.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For the Cat 9300s with ETA enabled, my current netflow config looks like this&lt;/P&gt;&lt;P&gt;flow record SW-RECORD&lt;BR /&gt;match datalink mac source address input&lt;BR /&gt;match datalink mac destination address input&lt;BR /&gt;match datalink vlan input&lt;BR /&gt;match ipv4 ttl&lt;BR /&gt;match ipv4 tos&lt;BR /&gt;match ipv4 protocol&lt;BR /&gt;match ipv4 source address&lt;BR /&gt;match ipv4 destination address&lt;BR /&gt;match transport source-port&lt;BR /&gt;match transport destination-port&lt;BR /&gt;match interface input&lt;BR /&gt;collect interface output&lt;BR /&gt;collect counter bytes long&lt;BR /&gt;collect counter packets long&lt;BR /&gt;collect timestamp absolute first&lt;BR /&gt;collect timestamp absolute last&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the below is the correct config for 9300's with ETA enabled (correct me if I'm wrong)&lt;/P&gt;&lt;P&gt;match ipv4 protocol&lt;BR /&gt;match ipv4 source address&lt;BR /&gt;match ipv4 destination address&lt;BR /&gt;match transport source-port&lt;BR /&gt;match transport destination-port&lt;BR /&gt;collect counter bytes long&lt;BR /&gt;collect counter packets long&lt;BR /&gt;collect timestamp absolute first&lt;BR /&gt;collect timestamp absolute last&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, what kind of issues can arise with the current configuration? Also, should ETA be enabled on ports that connect to cisco access points? I currently use vWLC&lt;/P&gt;</description>
      <pubDate>Sun, 24 Mar 2019 18:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3825146#M157</guid>
      <dc:creator>virtualpedia</dc:creator>
      <dc:date>2019-03-24T18:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: netflow config with eta</title>
      <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3828927#M158</link>
      <description>&lt;P&gt;That's a good looking&amp;nbsp; 9300 NetFlow for Stealthwatch config but it doesn't enable ETA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While Encrypted Traffic Analytics (ETA) currently uses Cisco NetFlow v9 as it's transport (export) protocol it is not enabled as part of the standard NetFlow configuration.&amp;nbsp; You want to take a look at the 'et-analytics ...' commands in order to enable ETA processing and export.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ETA process on the 9300 is separate from the NetFlow process.&amp;nbsp; ETA uses one of the available exporters; so if you configure NetFlow as you described and enable ETA your device will report 2 exporters.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the 9300 see:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/nmgmt/b_166_nmgmt_9300_cg/b_166_nmgmt_9300_cg_chapter_01000.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-6/configuration_guide/nmgmt/b_166_nmgmt_9300_cg/b_166_nmgmt_9300_cg_chapter_01000.pdf&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 14:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3828927#M158</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2019-03-29T14:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: netflow config with eta</title>
      <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3828939#M159</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Yes, I have ETA already configured.&amp;nbsp; My question was really what problem is created by using the first netflow configuration vs the second.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm going with the second config as that is what is recommended by Cisco, but I was just curious&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 15:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3828939#M159</guid>
      <dc:creator>virtualpedia</dc:creator>
      <dc:date>2019-03-29T15:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: netflow config with eta</title>
      <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3829193#M160</link>
      <description>&lt;P&gt;OK.&amp;nbsp; For this flow record to work with Cisco Stealthwatch (v6.10 or later) you'll need the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;match ipv4 proto&lt;/P&gt;
&lt;P&gt;match ipv4 source addr&lt;/P&gt;
&lt;P&gt;match ipv4 destination addr&lt;/P&gt;
&lt;P&gt;match transport source-port&lt;/P&gt;
&lt;P&gt;match transport destination-port&lt;/P&gt;
&lt;P&gt;match ipv4 tos&lt;/P&gt;
&lt;P&gt;collect interface out&lt;/P&gt;
&lt;P&gt;collect counter bytes&lt;/P&gt;
&lt;P&gt;collect counter packets&lt;/P&gt;
&lt;P&gt;collect timestamp sys-uptime first&lt;/P&gt;
&lt;P&gt;collect timestamp sys-uptime last&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are REQUIRED flow record fields for Stealthwatch v6.10 and later.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can add the following optional data elements to that flow record:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;collect routing next-hop address ipv4 (used for closest interface determination)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;collectipv4 ttl minimum&lt;/P&gt;
&lt;P&gt;collect ipv4 ttl max (these two data elements are used to understand the path of the flow through the network)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;collect transport tcp flag (to gain more insight into TCP connections)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 00:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3829193#M160</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2019-03-30T00:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: netflow config with eta</title>
      <link>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3829356#M161</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/103393"&gt;@brford&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate the reply.&amp;nbsp; There is where the configuration becomes confusing.&lt;/P&gt;&lt;P&gt;Per this guide, I see the configuration that you posted, which includes the required fields that you specified.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, also per this guide, if you scroll down, it shows the below, which was the tested configuration for Cat9K.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Netflow with Encrypted Traffic Analytics (ETA) on Catalyst 9k example&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;When configuring ETA to work with Stealthwatch you will configure both a Flexible NetFlow Monitor (and enable ETA enhanced NetFlow export&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;(for the ETA specific fields). The below configuration was validated with IOS v16.6.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;flow record ETA-C9K-RECORD&lt;BR /&gt;description Flow Record for ETA with Stealthwatch&lt;BR /&gt;match ipv4 protocol&lt;BR /&gt;match ipv4 source address&lt;BR /&gt;match ipv4 destination address&lt;BR /&gt;match transport source-port&lt;BR /&gt;match transport destination-port&lt;BR /&gt;collect counter bytes long&lt;BR /&gt;collect counter packets long&lt;BR /&gt;collect timestamp absolute first&lt;BR /&gt;collect timestamp absolute last&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should "match ipv4 tos" be included?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 17:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/netflow-config-with-eta/m-p/3829356#M161</guid>
      <dc:creator>virtualpedia</dc:creator>
      <dc:date>2019-03-30T17:44:05Z</dc:date>
    </item>
  </channel>
</rss>

