cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2688
Views
5
Helpful
6
Replies

Collect netflow data on the decrypted payload in IPSec traffic

SteffenT
Level 1
Level 1

Hi,

I have a case where our client have an IPSec Site-to-Site tunnel where traffic is being hair-pinned on a 2901 router.

They would like to collect netflow data on the decrypted payload for accounting purposes.

The problem is that according to order-of-operations on the IOS router, the netflow is recorded before the packet is decrypted ingress, and after the packet is encrypted egress.

Is there a solution to this, or does anyone have any experience with alternate solutions for this scenario?

(e.g SPAN encrypted traffic to a second device which decrypts and generate netflow data?)

Best Regards,

Steffen

1 Accepted Solution

Accepted Solutions

Hey Steffen,

Yes the cef path is then different[ Crypto map is an output feature while Tunnel Protection is a post-encap feature].

Therefore we can apply any output feature such as netflow on a tunnel or virtual-template interface since then we match the traffic post-decapsulation.

An example from one  of my box [ ping from  a vpn peer to 4.2.2.2 ]. Netflow catches the traffic after decryption.

R1-HUB#sh ip cache flow | i Vi1

Vi1           172.16.1.1      Et0/1         4.2.2.2         01 0000 0800   153

Cheers,

Olivier

View solution in original post

6 Replies 6

jakewilson
Level 1
Level 1

Hello Steffen,

You may need to configure Flexible NetFlow.  Here are a couple blogs that explain it:

http://www.plixer.com/blog/network-traffic-analysis/sending-netflow-over-ipsec-tunnels/

http://www.plixer.com/blog/flexible-netflow/netflow-export-over-ipsec-tunnel/

If they help, please vote on my reply.

Thank you,

Jake Wilson

NetFlow Knight

Hi Jake,

Sorry, but you've misunderstood the question.

I dont want to export netflow data over the IPSec tunnel, I want to collect Netflow data based on the payload in the encrypted IPSec packet.

IE the flow between the actual hosts which is encapsulated inside the IPSec tunnel, not the IPSec packets between the VPN peers.

olpeleri
Cisco Employee
Cisco Employee

Hey Steffen,

Instead of using a crypto map, if you would use a DVTI or VTI instead then you could apply netflow on the tunnel or on the virtual-template interface. That's the only workaround I've in mind.

Cheers,

Olivier

Hi Oliver,

Yea, we'll probably do that anyway, but will that solve my problem?

Does the tunnel interfaces have a different order of operation than physical interfaces?

Hey Steffen,

Yes the cef path is then different[ Crypto map is an output feature while Tunnel Protection is a post-encap feature].

Therefore we can apply any output feature such as netflow on a tunnel or virtual-template interface since then we match the traffic post-decapsulation.

An example from one  of my box [ ping from  a vpn peer to 4.2.2.2 ]. Netflow catches the traffic after decryption.

R1-HUB#sh ip cache flow | i Vi1

Vi1           172.16.1.1      Et0/1         4.2.2.2         01 0000 0800   153

Cheers,

Olivier

Awsome, thank you Oliver!