Adtran, a provider of telecommunications networking equipment and internetworking products, recently made NatVanta IPFIX and NetFlow support available for NetVanta 2630, 2630 Wireless, 2730 and 2830 security appliances running version 22.214.171.124 or later of Adtran NetVanta. The Adtran IPFIX Analyzer provides visibility into applications, intrusions, viruses and spyware, as well as user Internet access, VPN, VoIP and much more.
This NetFlow and IPFIX collector of course supports the majority of industry standard IP flow protocols — sFlow, jFlow, NetFlow,— but is specifically designed for Adtran IPFIX recording.
Adtran's IPFIX Analyzer can provide insight into which applications are consuming how much bandwidth and details on VPN tunnels and their traffic, while adding extra security via network threat detection. It can also provide an overview of individual user information with the help of any Adtran NetFlow-capable firewall, which exports user information to the IPFIX collector and enables reporting on user accounts, user/workstation IP addresses, domain, and user bandwidth consumption.
In addition to IPFIX reporting, the Adtran traffic analyzer can deliver e-mail notifications when inbound thresholds have been violated. More details about Adtran's IPFIX Analyzer are available from a recent Systrax blog post.
Systrax is a NetFlow and sFlow reporting resource provided by Plixer International, the company behind the popular Scrutinizer NetFlow and sFlow analyzer. Those looking to learn more about NetFlow and IPFIX need look no further than Plixer as the company is always providing new information about Flow analysis.
For example, the Maine-based provider is hosting a complimentary NetFlow & IPFIX Training class in New York City on December 20th from 8:30 a.m. to 4:30 p.m. at the MicroTek Facility on 90 Broad St. The flexible NetFlow provider also recently released a book that explains how Flow technologies are helping IT organizations manage large amounts of data quickly and easily, and with more knowledge into transactions using the networking infrastructure.
Edited by Jamie Epstein