Remove Email Remove Port Remove Routers
article thumbnail

How to find applications with NetFlow

Kentik

Back in the 1990s, NetFlow was introduced on Cisco routers as a means to collect information about IP network traffic as it enters or exits an interface. You can also learn about the protocols in use, the ports being used, the top interfaces, etc. Source port for UDP or TCP, 0 for other protocols. Don’t rely on ports.

article thumbnail

How to determine the source of SaaS latency

Kentik

Leading up to SaaS offerings, everything we communicated with over the network to do our jobs (other than surf the web and send email) was hosted on-premises. The NetOps team can’t Telnet to routers and look at routing tables, and they can’t change routes or span a port to collect packets.

Routers 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Advisory: Why You Should (Still) Care About Inbound Network Scans

CATO Networks

In some cases, network scanners will use port scans and in other cases ping sweeps. Attackers may try to gain control of IoT devices or routers, control them using a bot that may be used later for DDoS attacks (such as the Mirai botnet ) or even cryptocurrencies mining, which are very popular these days. What is Network Scanning?

Network 52
article thumbnail

Kentik APIs for Customer Portal Integration

Kentik

Top L4 Ports. Note that the API-token and API-email should be hidden from the customer, which it is not in this example. Choose a dimension: Total Traffic. Source Country. Source City. AS Top Talkers. Top IP Flows. Top Source IPs. Top Destination IPs. Choose a metric: Bits Per Second. Packets Per Second. Unique Source IPs.

Port 40
article thumbnail

Improving Legacy Approaches to Network Capacity Management

Kentik

How do you figure out when your links, routers, switches, firewalls, and other network infrastructure are going to run out of capacity? PoP or router group) we have defined in Kentik Detect. A good place to start is adding Source IP/CIDR, Destination IP/CIDR, and Destination Protocol:IP Port to see your top IP talkers on the link.

Network 40
article thumbnail

Detecting Hidden Spambots

Kentik

Here’s how these types of schemes work: The spammer sends a SYN from a spoofed source IP address to TCP port 25 (SMTP) on the target mail server. First, we’ll write a query to get a list of all the hosts in the network that are receiving traffic from remote source port TCP/25 (the traffic described in Step 2 above). ingress filtering).

TCP 40
article thumbnail

What is Network-as-a-Service and Why WAN Transformation Needs NaaS and SASE

CATO Networks

billed on an opex model consumption-based, via a metered metric (such as ports, bandwidth or users), (not based on network devices/appliances). NaaS offerings may include elements such as network switches, routers, gateways and firewalls.

NaaS 52