Released!

NetFlow Analyzer Enterprise Edition 7.0 is packed with a load of amazing features. The official PR is available here.

And happy to announce that NetFlow Analyzer Enterprise Edition supports Cisco NetFlow (and other flows), Cisco NBAR and Cisco CBQoS out–of–the–box. Download the 30-day free trial and try it out in your network setup.

Following are some of the new features added in 7.0.

  • Validating QoS policies with Cisco CBQoS – Enterprise edition now supports Cisco CBQoS and provides report on the per-class pre policy, post policy drops and queues. This new feature complements the already existing support for Cisco’s Network based application recognition (NBAR), helping in application mapping and providing better quality of service. Read more…
  • User based dashboard page for guests / Operators – Each user can have their own dashboard, only viewing devices that need to be monitored by them, which can be sorted based on utilization, speed etc.
  • Business hour alerts – makes sure that the users do not have to worry about the alerts that might be generated during non-business hours. With the new version of NetFlow Analyzer, business hours can be preset as per the enterprise’s need and the alerts can be activated only during that period.
  • Exclude IP address(es) option in IP groups – During creations of IP groups, the exclude option makes it much easier to exclude only particular addresses from a network as the requirement may be.
  • Radius authentication – Radius Server is useful in centralised management of user credential details. Once the user roles are defined in the User Management feature of NetFlow Analyzer, subsequent authentication of the user profiles can be done from the Radius Server.
  • Exclude encrypted applications – Enabling NetFlow on cryptomap tunnel interfaces double counts the ESP / GRE traffic. That can be prevented by applying this filter on cryptomap tunnel interfaces.
  • Output interface suppressionWAN optimizers compress the packets and therefore the flow size varies. The size of the packet going in and coming out is not the same, and the readings can be misleading and confusing, to say the least. To avoid this, “Output Interface Suppression” can be used. The interface in which the compression takes place (destination/output interface) can be suppressed.
  • ACL related drops – Access control filter drops the flow information which contains data pertaining to dropped traffic due to Access Control List.

Existing users can download the service pack. New evaluators can download the product from here.

And catchup with NetFlow Analyzer on twitter.

Cheers
Joe