Book description
Network flow analysis is the art of studying the traffic on a computer network. Understanding the ways to export flow and collect and analyze data separates good network administrators from great ones. The detailed instructions in Network Flow Analysis teach the busy network administrator how to build every component of a flow-based network awareness system and how network analysis and auditing can help address problems and improve network reliability.
Table of contents
-
Network Flow Analysis
- ACKNOWLEDGMENTS
- INTRODUCTION
- 1. FLOW FUNDAMENTALS
- 2. COLLECTORS AND SENSORS
- 3. VIEWING FLOWS
-
4. FILTERING FLOWS
- Filter Fundamentals
- Useful Primitives
- Filter Match Statements
- Using Multiple Filters
- Logical Operators in Filter Definitions
- Filters and Variables
-
5. REPORTING AND FOLLOW-UP ANALYSIS
- Default Report
- Modifying the Default Report
- Analyzing Individual Flows from Reports
- Other Report Customizations
-
Useful Report Types
- IP Address Reports
- Network Protocol and Port Reports
- Traffic Size Reports
- Traffic Speed Reports
-
Routing, Interfaces, and Next Hops
- Interfaces and Flow Data
- The First Interface: input-interface
- The Last Interface: output-interface
- The Throughput Matrix: input/output-interface
- The Next Address: ip-next-hop-address
- Where Traffic Comes from and How It Gets There: ip-source-address/output-interface
- Where Traffic Goes, and How It Gets There: ip-destination-address/input-interface
- Other Address and Interface Reports
- Reporting Sensor Output
- BGP Reports
- Customizing Reports
- 6. PERL, FLOWSCAN, AND CFLOW.PM
- 7. FLOWVIEWER
- 8. AD HOC FLOW VISUALIZATION
- 9. EDGES AND ANALYSIS
- About the Author
- UPDATES
Product information
- Title: Network Flow Analysis
- Author(s):
- Release date: June 2010
- Publisher(s): No Starch Press
- ISBN: 9781593272036
You might also like
book
Sams Teach Yourself Network Troubleshooting in 24 Hours, Second Edition
A practical, hands-on quide to network troubleshooting that emphasizes diagnostic techniques that both professionals and part-time …
book
Mastering CloudForms Automation
Learn how to work with the Automate feature of CloudForms, the powerful Red Hat cloud management …
book
Ubuntu Unleashed 2014 Edition: Covering 13.10 and 14.04,Ninth Edition
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. Ubuntu …
book
The Practice of Network Security Monitoring
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional …