Cisco traffic/utilization statistics - recommendations

Posted on 2011-05-09
Last Modified: 2012-05-11
A customer is looking for a way to analyze bandwidth utilization on Cisco router interfaces - specifically, how much (and what percentage) of BW is being used by:

- applications - HTTP(S), P2P, etc.
- L3 - which particular sources and/or destinations are consuming the most BW
- etc.

I know the Cisco interface commands (which only provide traffic volume over different periods of time.

Will Netflow provide this, or is a 3rd-party application required?  We need to provide a recommendation to the customer that they can use to pull this information on-demand, and that's relatively easy-to-use and cost-effective (if not built-in/free).

Thanks, and reference docs/links are always appreciated.

Question by:cfan73
    LVL 7

    Accepted Solution

    Netflow looks like the way to go for your customer. Solarwinds has a good solution for netflow. The have a free version with limitations. See
    Also there is
    Be aware that, although a lot, not all cisco platforms support netflow, specifically there are some sommonly catalyst switches which do not support it. You can check this with the cisco feature navigator at
    LVL 6

    Assisted Solution

    ip nbar is a good idea, it is a simple tool that can be enabled per interface
    To enable nbar for fast 0/0 interface

    (config)#interface FastEthernet0/0
    (config-if)#ip nbar protocol-discovery

    Once NBAR is gathering data, you can use the 'show ip nbar resources' command to see how much memory it’s taking up. As long as the numbers are acceptable, you can leave NBAR protocol discovery running as long as you like. To see the really interesting information, issue 'show ip nbar protocol-discover' and look at all the protocols flowing to (and perhaps through) your router. In the screenshot to the right, you can see that I’ve limited the output by using the 'top-n' variant of the above command.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Suggested Solutions

    Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now