NetFlow overview
NetFlow provides visibility into:- Traffic patterns: Who is talking to whom, on which ports
- Bandwidth utilization: Top talkers, protocols, and applications
- Anomaly detection: Unusual traffic spikes or patterns
- Threat detection: Command and control traffic, data exfiltration
- Compliance: Network activity logs for audit requirements
NetFlow data complements log data by providing network flow information even when devices don’t generate detailed logs.
Supported protocols
| Protocol | Version | Features |
|---|---|---|
| NetFlow | v5 | Basic flow data (src/dst IP, ports, protocol, bytes, packets) |
| NetFlow | v9 | Flexible templates, application awareness, MPLS support |
| IPFIX | v10 | Enhanced v9, international standard, variable-length fields |
| sFlow | v5 | Packet sampling, multi-vendor support |
UTMStack NetFlow collector
UTMStack listens for NetFlow on these ports:Configure NetFlow exporters
Cisco routers and switches
Configure Cisco IOS devices:Fortinet FortiGate
Configure FortiGate NetFlow export:Palo Alto Networks
Configure Palo Alto firewalls:Enable NetFlow/IPFIX
Navigate to Device → Server Profiles → NetFlow ProfileCreate new profile:
- Name: UTMStack-NetFlow
- NetFlow Server: utm-server.company.com:2055
- Source IP: Management interface IP
- Template Refresh: 60 seconds
- Active Timeout: 60 seconds
- Inactive Timeout: 30 seconds
Apply to zones
Navigate to Network → Network Profiles → Zone ProtectionEdit zone protection profile and enable:
- NetFlow Profile: UTMStack-NetFlow
Juniper routers
Configure Juniper NetFlow:Mikrotik routers
Configure Mikrotik NetFlow:Linux with softflowd
Collect NetFlow from Linux systems:/etc/default/softflowd
NetFlow sampling
For high-traffic networks, use sampling to reduce NetFlow volume:Cisco sampling
FortiGate sampling
Sampling trade-offs:
- Reduces NetFlow volume and processing load
- May miss small/short-lived flows
- Bandwidth calculations need adjustment
- Recommended ratio: 1:100 to 1:1000 based on traffic volume
NetFlow analysis in UTMStack
Once NetFlow is configured, UTMStack provides:Traffic dashboards
- Top talkers (by source IP, destination IP, protocol)
- Bandwidth utilization over time
- Protocol distribution
- Application visibility
- Geographic traffic maps
Threat detection
UTMStack correlates NetFlow with threat intelligence:- C2 communication: Detect connections to known malicious IPs
- Data exfiltration: Identify unusual outbound traffic volumes
- Port scanning: Detect reconnaissance activity
- DDoS attacks: Identify traffic floods
- Lateral movement: Unusual internal traffic patterns
Network forensics
Investigate security incidents:NetFlow data fields
UTMStack normalizes NetFlow data to these fields:Performance considerations
NetFlow volume estimation
| Network Size | Flows/Second | Daily Volume | Storage/Month |
|---|---|---|---|
| Small (100 users) | 500 | 43M flows | 5 GB |
| Medium (1000 users) | 5,000 | 432M flows | 50 GB |
| Large (10,000 users) | 50,000 | 4.3B flows | 500 GB |
Optimization tips
Reduce NetFlow volume
Reduce NetFlow volume
- Use sampling: 1:100 or 1:1000 for large networks
- Adjust timeouts: Increase inactive timeout to reduce flows
- Filter internal traffic: Export only Internet-bound traffic
- Aggregate: Use NetFlow v9/IPFIX aggregation features
Improve collection performance
Improve collection performance
- Dedicated collector: Separate NetFlow from log collection
- Buffer sizing: Increase UDP receive buffer
- Multiple collectors: Distribute load across collectors
- SSD storage: Use SSDs for NetFlow index storage
Troubleshooting
No NetFlow data received
No NetFlow data received
-
Verify exporter configuration:
-
Check network connectivity:
- Verify firewall rules allow UDP 2055
-
Check UTMStack listener:
NetFlow received but not displayed
NetFlow received but not displayed
- Check NetFlow index exists:
netflow-* - Verify time range in searches
- Review parsing errors in UTMStack logs
- Check index mapping for field conflicts
Incorrect traffic statistics
Incorrect traffic statistics
- Verify sampling ratio: Adjust bandwidth calculations
- Check clock synchronization: Use NTP on exporters and UTMStack
- Review timeout settings: Short timeouts may split long flows
Best practices
Next steps
Traffic dashboards
Visualize NetFlow data
Threat hunting
Hunt for threats in NetFlow
Alert rules
Create NetFlow-based alerts
Integrations
Combine with other data sources