<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ETA with 9300 switch configuration SW 7.1 in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014238#M396</link>
    <description>&lt;P&gt;I am trying to make sure I got the right config.&lt;/P&gt;&lt;P&gt;looking at this&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I was looking at the 9300 config and it shows that netflow is enabled both inbound and outbound, and it was only enabled on uplink interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question:&lt;/P&gt;&lt;P&gt;1) are the right fields in that documents and still accurate ?&lt;/P&gt;&lt;P&gt;2) almost all sample configs only show netflow enabled on the inbound - do we need to enable input/output ?&lt;/P&gt;&lt;P&gt;3) if I have a 9300 layer2 switch - can I enabled netflow on all switch ports and also enable ETA on all those interfaces&amp;nbsp; ? Potential performance issues ?&amp;nbsp; the sample showed enabling netflow on uplink interface and only enabling ETA on the access interface ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description Uplink Interface&lt;BR /&gt;&amp;nbsp;no switchport&lt;BR /&gt;&amp;nbsp;ip flow monitor ETA-FLOWMONITOR input&lt;BR /&gt;&amp;nbsp;ip flow monitor ETA-FLOWMONITOR output&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;et-analytics&lt;BR /&gt;&amp;nbsp;ip flow-export destination &amp;lt;dest ip address&amp;gt; 2055&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;interface gigabitEthernet 1/0/2&lt;BR /&gt;&amp;nbsp;description access layer interface&lt;BR /&gt;&amp;nbsp;switchport&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;&amp;nbsp;et-analytics enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;&amp;nbsp;I found this in the docs:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="Arial"&gt;Flexible NetFlow monitor can be applied on the same interface that has ETA enabled, only if the other flow monitor has the same 5-tuple in the match field. So, Flexible NetFlow with only limited set of match attributes is supported&lt;/FONT&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wish if this was more clear &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; so what are best practices on what interfaces&amp;nbsp;we enable netflow vs ETA ? and what is the downside of not having the extended attributes&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jan 2020 07:55:21 GMT</pubDate>
    <dc:creator>tomalexis</dc:creator>
    <dc:date>2020-01-20T07:55:21Z</dc:date>
    <item>
      <title>ETA with 9300 switch configuration SW 7.1</title>
      <link>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014238#M396</link>
      <description>&lt;P&gt;I am trying to make sure I got the right config.&lt;/P&gt;&lt;P&gt;looking at this&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I was looking at the 9300 config and it shows that netflow is enabled both inbound and outbound, and it was only enabled on uplink interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question:&lt;/P&gt;&lt;P&gt;1) are the right fields in that documents and still accurate ?&lt;/P&gt;&lt;P&gt;2) almost all sample configs only show netflow enabled on the inbound - do we need to enable input/output ?&lt;/P&gt;&lt;P&gt;3) if I have a 9300 layer2 switch - can I enabled netflow on all switch ports and also enable ETA on all those interfaces&amp;nbsp; ? Potential performance issues ?&amp;nbsp; the sample showed enabling netflow on uplink interface and only enabling ETA on the access interface ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description Uplink Interface&lt;BR /&gt;&amp;nbsp;no switchport&lt;BR /&gt;&amp;nbsp;ip flow monitor ETA-FLOWMONITOR input&lt;BR /&gt;&amp;nbsp;ip flow monitor ETA-FLOWMONITOR output&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;et-analytics&lt;BR /&gt;&amp;nbsp;ip flow-export destination &amp;lt;dest ip address&amp;gt; 2055&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;interface gigabitEthernet 1/0/2&lt;BR /&gt;&amp;nbsp;description access layer interface&lt;BR /&gt;&amp;nbsp;switchport&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;&amp;nbsp;et-analytics enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;&amp;nbsp;I found this in the docs:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="Arial"&gt;Flexible NetFlow monitor can be applied on the same interface that has ETA enabled, only if the other flow monitor has the same 5-tuple in the match field. So, Flexible NetFlow with only limited set of match attributes is supported&lt;/FONT&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wish if this was more clear &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; so what are best practices on what interfaces&amp;nbsp;we enable netflow vs ETA ? and what is the downside of not having the extended attributes&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 07:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014238#M396</guid>
      <dc:creator>tomalexis</dc:creator>
      <dc:date>2020-01-20T07:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: ETA with 9300 switch configuration SW 7.1</title>
      <link>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014811#M399</link>
      <description>&lt;P&gt;I've found that the best references regarding configuring Encrypted Traffic Analytics (ETA) are:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the ETA White Paper (&lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.pdf&lt;/A&gt; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and the&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the Design Guide (&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/eta-design-guide-2019oct.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/eta-design-guide-2019oct.pdf&lt;/A&gt; )&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are design and deployment decisions that have to be made when deploying ETA on your network infrastructure.&amp;nbsp; ETA meta data represents new NetFlow / IPFIX meta data that is generated by new process running on devices where it is deployed.&amp;nbsp; ETA runs in this new process because it can be deployed on a variety of hardware (physical and virtual) with from as little as 2 Ethernet interfaces (where it would have little impact) to as many as 48 ports where it may have a significant impact depending on how it is designed and deployed.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 18:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014811#M399</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2020-01-20T18:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: ETA with 9300 switch configuration SW 7.1</title>
      <link>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014972#M400</link>
      <description>&lt;P&gt;thx Brian .. I did find that document after I put my post, but its still doesn't answer all my questions and it doesn't talk about where to put FNF only and ETA. it does have some pointers.&lt;/P&gt;&lt;P&gt;Mine is a very small deployment about&amp;nbsp;6 sites each with their own internet breakout&amp;nbsp;44xx router and a VPN mesh between the sites. Each site has a core 9300 and edge 9300 that connect to the 44xx ISR.&lt;/P&gt;&lt;P&gt;My thoughts are that I could have full blown FNF on all the 9300 switch ports to gather and east-west traffic or port scans etc, and then only enable ETA/FNF on the ISR inside interface of each site ?&lt;/P&gt;&lt;P&gt;Does that look good ? looking for others who have done this. Any gotchas ?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 00:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/eta-with-9300-switch-configuration-sw-7-1/m-p/4014972#M400</guid>
      <dc:creator>tomalexis</dc:creator>
      <dc:date>2020-01-21T00:55:47Z</dc:date>
    </item>
  </channel>
</rss>

