Remove Port Remove Protocol Remove Routers
article thumbnail

Pumas, Routers & Keepalives—Oh my!

Heroku

This week , Heroku made Router 2.0 Throughout the Router 2.0 A small subset of Puma applications would experience increased response times upon enabling the Router 2.0 flag, reflected in customers Heroku dashboards and router logs. flag, reflected in customers Heroku dashboards and router logs. dyno root@router.1019708

Routers 59
article thumbnail

How to find applications with NetFlow

Kentik

Back in the 1990s, NetFlow was introduced on Cisco routers as a means to collect information about IP network traffic as it enters or exits an interface. You can also learn about the protocols in use, the ports being used, the top interfaces, etc. IP protocol. Source port for UDP or TCP, 0 for other protocols.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Multi-Path TCP: revolutionizing connectivity, one path at a time

CloudFaire

As a result, Internet devices usually use a single path and let the routers handle the path selection. It's a major extension to the TCP protocol, and historically most of the TCP changes failed to gain traction. After the initial TCP handshake, each peer may announce additional addresses (and ports) on which it can be reached.

TCP 137
article thumbnail

From Idle to Established: BGP states, BGP ports and TCP interactions

Noction

Similar to interior gateway protocols (IGPs) like EIGRP, OSPF, or ISIS, BGP establishes peering with other routers before exchanging routing information. Understanding BGP states is essential to grasp how BGP operates. However,

Port 52
article thumbnail

Gathering, Understanding, and Using Traffic Telemetry for Network Observability

Kentik

This can be done through a variety of techniques, such as using network taps, port mirroring, or software probes. Port mirroring Another method for gathering traffic telemetry is port mirroring, which replicates (mirrors) the network traffic on a switch or router to a monitoring device.

Network 111
article thumbnail

How Race Communications Used Kentik to Stop Mirai Botnet Infection and Abuse

Kentik

The Mirai botnet was first discovered back in 2016, but has continued to persist and abuse common vulnerabilities and exposures (CVEs) on IoT devices, including home routers and many other network-connected devices. These addresses were apparently port scanning IP addresses that belonged to the company sending the letter.

Port 81
article thumbnail

The (Net)Flow That Kentik Makes Go: Know Your Traffic Flow Data Protocols

Kentik

Not Just for NetFlow, Kentik Detect’s Analytics Cover All Major Flow Protocols. In networking terms, a “flow” defines a uni-directional set of packets sharing common attributes such as source and destination IP, source and destination ports, IP protocol, and type of service. Source & dest port. Flow Data Variations.