[183421] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NetFlow - path from Routers to Collector

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Sep 1 19:08:30 2015

X-Original-To: nanog@nanog.org
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <ECA18BD1-E747-44C7-983E-69AF5D7B17B9@arbor.net>
Date: Tue, 1 Sep 2015 19:06:50 -0400
To: Roland Dobbins <rdobbins@arbor.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org


> On Sep 1, 2015, at 6:51 PM, Roland Dobbins <rdobbins@arbor.net> wrote:
>=20
>=20
> On 2 Sep 2015, at 5:38, Jared Mauch wrote:
>=20
>> Please stop digging,
>=20
> Since I'm not digging, I've no reason to stop.  I see and deal with =
the various quirks of more different platforms exporting flow telemetry =
than most folks, all day, every day, so I know just a little bit about =
this topic.

You are, Avi has said that the number of people with a network is =
outnumbered about 50:1 using his most favorable numbers.  This means for =
your one example there are 50 people not doing this and the world =
hasn=E2=80=99t ended for them.  If you aren=E2=80=99t listening to Avi, =
please
trust me, you don=E2=80=99t need your own OOB network for flow, nor is =
putting your flow there going to provide you some magical value.  If you
can=E2=80=99t provision enough bandwidth for your telemetry data, you =
will obviously need to prune it back.  1:10k sampling works and you =
don=E2=80=99t
need much more than that unless you=E2=80=99re at extremely low =
bitrates.  Most attacks last under 1 hour and even the small ones shout =
out
in netflow data doing a simple hash sort algorithm with the proper keys. =
 You can even use QoS to mitigate if your goal is attack
traffic as they=E2=80=99re mostly UDP based attacks, see: =
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00 for some =
advice/input.

I=E2=80=99ve shared my own input at recent NANOG meetings, including =
policers to keep the attacks under control.

>> Sounds like you haven=E2=80=99t used Cisco recently.
>=20
> I use Cisco all the time, thanks.  They aren't perfect - no vendor is. =
 They have various issues with their NetFlow implementations on various =
platforms - for example, bursts of wildly inaccurate flow statistics =
from CRS boxes when a linecard is rebooted, a problem which has =
persisted for years and is just now being addressed. Odd stuff with =
EARL8 on Sup2T/DFC4 in certain configurations, and so forth.

I=E2=80=99m not talking about datacenter class equipment that you seem =
so focused on like the Earl7 with the TICO etc that did software =
sampling out of the hardware tcam and would be overrun.

> But Niels is grossly exaggerating. I get very usable flow telemetry =
from them in many, many networks.  I deal with  flow telemetry from =
many, many vendors/platforms, and I can confidently assert that Cisco =
are nowhere near the bottom of the heap when it comes to the =
verisimilitude and functionality of their flow telemetry export.  Quite =
the opposite

What people often don=E2=80=99t see is true =E2=80=9Cscale=E2=80=9D[1] =
of netflow.  When you have enough attributes or want to actually look at =
your IPv6 there have been significant shortcomings.  We had to remind =
the patent holder for netflow how to implement it for their own =
hardware.

- Jared

aside: will you be in Yokohama?  We should get lunch/dinner.


[1] - I hate this word, vendors use it as an excuse to hardcode limits =
and to not properly respond to valid use cases=

home help back first fref pref prev next nref lref last post