Cisco Performance Monitor

This topic is to discuss the following lesson:

Hi Rene
I am try to see the difference between Performance monitor and netflow
and what is the best solution

Hello Fabrice

Cisco Performance Monitor is not a replacement or an alternative to Netflow. CPM is an extension to Flexible Netflow, which itself is an extension to Netflow v9. Which you will choose depends on what level of monitoring you desire.

CPM is ideal for monitoring metrics for real-time applications. Metrics such as Jitter, packet loss and round trip time are all vital for such applications. CPM would be very beneficial if you have such applications, however, if you don’t, Netflow may be sufficient for your needs. You will have to evaluate this based upon your requirements.

I hope this has been helpful!

Laz

1 Like

Hi Everyone,

I have just tried this lesson but don’t appear to have the full command set although my research suggests all commands should be available for these ios vers. Currently I have the following:

7200 Software (C7200-ADVENTERPRISEK9-M), Version 15.2(4)S3,

C2600-IPBASEK9-M), Version 12.4(18)

In addition to the above I have tried multiple ADVENTERPRISE images from 3000 to 7000 series in GNS3 but dont appear to have any access to the command set for these labs… can anyone advise?

Many Thanks
Frank

Hello Frank

Take a look at the following link. It contains the various Cisco Performance Monitor commands and the IOS versions that support them for the various platforms including the 2600 and the 7200.

Hopefully this will give you a better idea of what’s available on your IOS versions.

I hope this has been helpful!

Laz

Hello,

In Reference to this lesson: https://networklessons.com/cisco/ccie-routing-switching-written/cisco-performance-monitor.

some of the commands do not work in my cisco 9200 series, i try using also Easy Performance Monitor (ezPM) also for the cisco 9200.not working.

Kindly assist with configuration set for netflow for 9200 switches.I am tasked to send a the netflow to a PRTG monitor.

Hello Temitope

According to the following release notes for the 9200 switches, Cisco Performance Monitoring (PerfMon) is not supported.

However, it does support NBAR which can also be used for this. More information about this can be found here:


For information about how you can use netwflow take a look at the following lesson:

I hope this has been helpful!

Laz

Hi community!
I have installed graylog-server ( IP :192.168.122.129) on Ubuntu 18.0.4 server in gns3 appliance and tried collecting netflow v9 traffic configured from router R1 (IP :192.168.122.10) as demonstrated in the video. NETFLOW messages in the graylog-server.

1 Like

Question about flow record, match and collect:

Hello guys, I want to know if Im correct here or if i have to think differently about that:

The match statement says of how we group a packets together as a flow, meaning that if i would only match on the destination address field that is a group of packets, regardless of the protocol we are using, eg. TCP, UDP, ICMP, etc. So in this case, regardless of the traffic, it would all be collected as a single flow, because we match only on the destination address.

For the collect statement: The collect statement says, what information we want to collect about these packets. Is that correct? Or is it, that the collect statement tells, how many flows we will have?

Errata: I think it should be determined trough the collect statements, in terms of “this traffic belongs to this flow, and this other traffic is a different flow”.

Thanks in advance!

Kind regards,
Mirko

Hello Mirko

The difference between the match and collect keywords in the context of CPM is a little bit nuanced and needs further explanation.

The match keyword is used to define criteria for classifying network traffic. When configuring a class map, the match statements specify the conditions that packets must meet to be considered part of the class. In the context of CPM, they define the flow, as you suggest in your post.

The collect keyword, on the other hand, is used for gathering statistics or metrics about the traffic that has been matched and classified into this flow. When you use the collect command, it enables the monitoring and recording of specific information about the traffic that has been matched using the match keyword.

There is another distinction between match and collect that is especially useful: Match criteria are considered key fields while collect parameters are considered nonkey fields.

A key field is a parameter or attribute used to categorize or classify network traffic. Examples of key fields include source and destination IP addresses, port numbers, protocol types, and more. These fields are used in match statements in class maps to define the criteria for traffic classification.

Nonkey fields, on the other hand, are additional data points that provide further information about the traffic but are not used for classifying the traffic into different classes. When you use the collect command, you can specify which nonkey fields to gather data on. These might include things like:

  • Packet lengths
  • Time stamps (to calculate flow duration)
  • TCP flags
  • Packet counts
  • Byte counts
  • Other flow-specific details that are not used for classification but are useful for monitoring and analysis purposes

So flows are defined using the match statement, and the information that is monitored about that flow is specified using the collect statement.

I hope this has been helpful!

Laz

Hello, everyone.

What exactly does the collect ipv4 destination prefix option do? I know that if we were to specify “address”, we’d be collecting the destination IP address but what exactly does the prefix option collect?

Thank you!

David

Hello David

Let’s take a step back and see what all the commands that start with collect actually do. The collect command is used to specify additional fields to be recorded for each network traffic flow. These fields are called nonkey fields.

Key fields are used to define and identify a unique flow (like source/destination IP addresses, ports, protocol types). Nonkey fields provide supplementary information about each flow. They enrich the flow record but do not define the flow itself. So additional information about the specific flow is collected, but only as nonkey fields.

For example, the collect ipv4 destination prefix command you mentioned is used to gather statistics about destination IP address prefixes in the packets being monitored, as nonkey fields. The complete command syntax is:

collect ipv4 destination {address | {mask | prefix} [minimum-mask mask]}

Take a look at this Cisco command line reference documentation for more information on the specific command. The same document includes all of the collect commands as well.

I hope this has been helpful!

Laz