Published On: August 5ᵗʰ, 2019 19:09
Flexible Netflow Configuration Guide, Cisco IOS Release 15SY
TrustSec NetFlow IPv6 SGACL Deny and Drop Export
The TrustSec NetFlow IPv6 SGACL Deny and Drop Export feature enables Flexible NetFlow to collect Cisco Trusted Security (CTS) information in IPv6 traffic.
- Finding Feature Information
- Information About TrustSec NetFlow IPv6 SGACL Deny and Drop Export
- How to Configure TrustSec NetFlow IPv6 SGACL Deny and Drop Export
- Configuration Examples for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
- Additional References for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
- Feature Information for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About TrustSec NetFlow IPv6 SGACL Deny and Drop Export
TrustSec NetFlow IPv6 SGACL Deny and Drop Export Overview
A Security Group Access Control List (SGACL) is used to filter untrusted packets. The TrustSec NetFlow IPv6 SGACL Deny and Drop Export feature enables Flexible NetFlow to collect Cisco Trusted Security (CTS) information in IPv6 traffic.
How to Configure TrustSec NetFlow IPv6 SGACL Deny and Drop Export
Configuring a Customized Flow Record
Perform this task to configure a customized flow record.
Customized flow records are used to analyze traffic data for a specific purpose. A customized flow record must have at least one match criterion for use as the key field and typically has at least one collect criterion for use as a nonkey field.
There are hundreds of possible permutations of customized flow records. This task shows the steps that are used to create one of the possible permutations. Modify the steps in this task as appropriate to create a customized flow record for your requirements.
1.
enable
2.
configure
terminal
3.
flow
record
record-name
4.
description
description
5.
match
{ |
ipv6} {destination |
source}
address
6. Repeat Step 5 as required to configure additional key fields for the record.
7.
8. Repeat the above step as required to configure additional nonkey fields for the record.
9.
end
10.
show
flow
record
record-name
11.
show
running-config
flow
record
record-name
DETAILED STEPS
Creating a Customized Flow Monitor
Perform this required task to create a customized flow monitor.
Each flow monitor has a separate cache assigned to it. Each flow monitor requires a record to define the contents and layout of its cache entries. These record formats can be one of the predefined formats or a user-defined format. An advanced user can create a customized format using the flow record command.
If you want to use a customized record instead of using one of the Flexible NetFlow predefined records, you must create the customized record before you can perform this task. If you want to add a flow exporter to the flow monitor for data export, you must create the exporter before you can complete this task.
![]() Note |
You must use the no ip flow monitor command to remove a flow monitor from all of the interfaces to which you have applied it before you can modify the parameters for the record command on the flow monitor. For information about the ip flow monitor command, refer to the Cisco IOS Flexible NetFlow Command Reference. |
1.
enable
2.
configure
terminal
3.
flow
monitor
monitor-name
4.
description
description
5.
record
{record-name |
netflow-original |
netflow {ipv4 |
ipv6}
record [peer]}
6.
cache
{entries
number |
timeout
{active |
inactive |
update}
seconds |
{immediate |
normal
|
permanent}}
7. Repeat Step 6 as required to finish modifying the cache parameters for this flow monitor.
8.
statistics
packet
protocol
9.
statistics
packet
size
10.
exporter
exporter-name
11.
end
12.
show
flow
monitor
[[name]
monitor-name
[cache [format {csv |
record |
table}]]
[statistics]]
13.
show
running-config
flow
monitor
monitor-name
DETAILED STEPS
| Command or Action | Purpose | |
|---|---|---|
| Step 1 |
enable
Example: > enable |
Enables privileged EXEC mode. |
| Step 2 |
configure
terminal
Example: # configure terminal |
Enters global configuration mode. |
| Step 3 |
flow
monitor
monitor-name
Example: (config)# flow monitor FLOW-MONITOR-1 |
Creates a flow monitor and enters Flexible NetFlow flow monitor configuration mode. |
| Step 4 |
description
description
Example: (config-flow-monitor)# description Used for basic ipv4 traffic analysis |
(Optional) Creates a description for the flow monitor. |
| Step 5 |
record
{record-name | netflow-original |
netflow
{ipv4 |
ipv6}
record
[peer]} Example: (config-flow-monitor)# record FLOW-RECORD-1 |
Specifies the record for the flow monitor. |
| Step 6 |
cache
{entries number |
timeout
{active |
inactive | update} seconds |
{immediate | normal | permanent}} Example: |
(Optional) Modifies the flow monitor cache parameters such as timeout values, number of cache entries, and the cache type. The values for the keywords associated with the timeout keyword have no effect when the cache type is set to immediate. |
| Step 7 | Repeat Step 6 as required to finish modifying the cache parameters for this flow monitor. |
— |
| Step 8 |
statistics
packet
protocol
Example: (config-flow-monitor)# statistics packet protocol |
(Optional) Enables the collection of protocol distribution statistics for Flexible NetFlow monitors. |
| Step 9 |
statistics
packet
size
Example: (config-flow-monitor)# statistics packet size |
(Optional) Enables the collection of size distribution statistics for Flexible NetFlow monitors. |
| Step 10 |
exporter
exporter-name
Example: (config-flow-monitor)# exporter EXPORTER-1 |
(Optional) Specifies the name of an exporter that was created previously. |
| Step 11 |
end
Example: (config-flow-monitor)# end |
Exits Flexible NetFlow flow monitor configuration mode and returns to privileged EXEC mode. |
| Step 12 |
show
flow
monitor
[[name] monitor-name [cache [format {csv | record | table}]] [statistics]] Example: # show flow monitor FLOW-MONITOR-2 cache |
(Optional) Displays the status and statistics for a Flexible NetFlow flow monitor. |
| Step 13 |
show
running-config
flow
monitor
monitor-name
Example: # show running-config flow monitor FLOW_MONITOR-1 |
(Optional) Displays the configuration of the specified flow monitor. |
Applying a Flow Monitor to an Interface
Before it can be activated, a flow monitor must be applied to at least one interface. Perform this required task to activate a flow monitor.
1.
enable
2.
configure
terminal
3.
interface
type
number
4. {ip | ipv6} flow monitor monitor-name {input | output}
5. Repeat Steps 3 and 4 to activate a flow monitor on any other interfaces in the device over which you want to monitor traffic.
6.
end
7.
show
flow
interface
type
number
8.
show
flow
monitor
name
monitor-name
cache
format
record
DETAILED STEPS
| Command or Action | Purpose | |
|---|---|---|
| Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode.
|
| Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. |
| Step 3 |
interface
type
number
Example: Device(config)# interface GigabitEthernet 0/0/0 |
Specifies an interface and enters interface configuration mode. |
| Step 4 | {ip | ipv6} flow
monitor monitor-name {input | output} Example: Device(config-if)# ip flow monitor FLOW-MONITOR-1 input |
Activates a flow monitor that was created previously by assigning it to the interface to analyze traffic. |
| Step 5 | Repeat Steps 3 and 4 to activate a flow monitor on any other interfaces in the device over which you want to monitor traffic. |
— |
| Step 6 |
end
Example: Device(config-if)# end |
Exits interface configuration mode and returns to privileged EXEC mode. |
| Step 7 |
show
flow
interface
type
number
Example: Device# show flow interface GigabitEthernet 0/0/0 |
Displays the status of Flexible NetFlow (enabled or disabled) on the specified interface. |
| Step 8 |
show
flow
monitor
name
monitor-name
cache
format
record
Example: Device# show flow monitor name FLOW_MONITOR-1 cache format record |
Displays the status, statistics, and flow data in the cache for the specified flow monitor. |
Configuration Examples for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
Example: Configuring Flexible NetFlow for CTS Fields in IPv6 traffic
This following example configures the collection of the Cisco TrustSec (CTS) fields, source Security Group Tag (SGT) and destination Security Group Tag (DGT), in IPv6 traffic.
This sample starts in global configuration mode:
! flow exporter EXPORTER-1 destination 172.16.10.2 transport udp 90 exit flow record rm_1 match ipv6 protocol match ipv6 source address match ipv6 destination address match transport source-port match transport destination-port match flow direction match flow cts source group-tag match flow cts destination group-tag collect routing source as collect routing destination as collect routing source as peer collect routing destination as peer collect routing next-hop address ipv6 collect routing next-hop address ipv6 bgp collect ipv6 source prefix collect ipv6 source mask collect ipv6 destination prefix collect ipv6 destination mask collect interface input collect interface output collect counter bytes collect counter packets collect timestamp sys-uptime first collect timestamp sys-uptime last ! flow monitor mm_1 record rm_1 exporter EXPORTER-1 ! interface FastEthernet0/0 ip address 172.16.2.2 255.255.255.0 ip flow monitor mm_1 input ! end
Additional References for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
Related Documents
MIBs
Technical Assistance
|
Description |
Link |
|---|---|
|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
Feature Information for TrustSec NetFlow IPv6 SGACL Deny and Drop Export
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.|
Feature Name |
Releases |
Feature Information |
|---|---|---|
|
TrustSec NetFlow IPv6 SGACL Deny and Drop ExportS |
12.2(50)SY 15.0(1)SY 15.0(1)SY1 |
Enables Flexible NetFlow to collect Cisco Trusted Security (CTS) information in IPv6 traffic. The following commands were introduced or modified: collect flow, match flow, show flow monitor. |
