Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Cisco Netflows

Posted on 2011-09-28
Medium Priority
Last Modified: 2012-05-12
I am migrating my config from an old router to a new ASR 1001, and the following cmds are not accepted ...

ip flow-top-talkers - Configure netflow top talkers
 top 30
 sort-by bytes
 cache-timeout 150000
 match direction ingress

Does anyone know what ip flow-top-talkers was replaced with  ?

Thanks in advance
Question by:Elemental12
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 18

Expert Comment

ID: 36807119
What version of code are you running?  
LVL 26

Expert Comment

ID: 36815376
Yeah, what version cause I see not reason those commands shouldn't work.

Author Comment

ID: 36815393
Version 15.1(3)S, RELEASE SOFTWARE (fc1)
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!


Author Comment

ID: 36815470
from more research, it appears this cmd is used to view netflow data right on the device, rather than some downstream aggregator... I have a device collecting netflow and making it look nice for us, so do I even need this cmd running locally on my router ?

LVL 26

Accepted Solution

Soulja earned 2000 total points
ID: 36815602
Oh, I though you wanted to look at it locally on your router. If you are exporting it to an external collector than no need for it.
LVL 26

Expert Comment

ID: 36815612
Addiotionally, 15.1 should support those commands. Very strange.

Author Closing Comment

ID: 36815648
Thank you for the confirmation.

Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question