Hardware, virtual or cloud, from 10 Mb/s to 100 Gb/s.
The Probe connects passively through a SPAN port or network TAP.
Network data is pre-filtered to enable clearer analysis and visualization.
Probes natively collect L2–L4 information on IP addresses, protocols, server response time, round trip time, jitter, and more, while leveraging traffic decapsulation to monitor the real user-application conversation instead of the tunnel itself. In addition, Flowmon's IPFIX extension provides additional L7 data, such as hostnames, URLs, browser information for HTTP/S protocols, and other fields for protocols like DNS, DHCP, SQL, SMTP, or Samba/CIFS, and more.
Leveraging a wide array of metrics, it enables insight into the performance of the network. The Probe measures server delay (Server Response Time) and network delay (Round Trip Time), as well as Jitter, TCP Retransmissions or out-of-order packets.
Flowmon’s encrypted traffic analysis collects network traffic metadata in the IPFIX format using Probes and enriches it with TLS protocol information. This provides a wealth of information about the traffic and allows for the identification of out-of-date SSL certificates, policy non-compliant certificates, encryption strength and old TLS versions that may contain faults or vulnerabilities.
Flowmon reports on the use of applications by analyzing L7 packets and exporting Network-Based Application Recognition (NBAR2) name or provides information on the source or destination of network traffic with the Autonomous System (AS) number.
Using Flowmon IDS Probe powered by Suricata enables packet inspection to seek potential intrusion, complementing the signature-less approach of Flowmon ADS and providing an additional level of security. The extension works in environments of any link speed from 1 Gb/s to 100 Gb/s, and the detected events may be exported to any target.
The Flowmon Probe can be deployed in any kind of network without an impact on network traffic at speeds of 10 Mb/s to 100 Gb/s. Virtual Probes can be deployed in virtual environments such as VMware, Hyper-V, KVM, or as a cloud application in AWS, Azure and Google Cloud.