Software Secure Workload
Activity Configure

Network Flow Information

Network flow information is the summarization of all packets flowing through the system. There are two modes of capturing flow information: Detailed and Conversation. By default, the Conversation mode is used to capture the flow information. The captured flows are exported to a collector and the exported information includes:

  • Flow identifier: Uniquely identify the network flow. It includes the general information such as: IP protocol, source and destination IP, and layer 4 ports.

  • IP Information: Contains information that is seen in the IP header, such as: TTL, IP flags, Packet ID, IP options, and Fragmentation flags.

  • TCP Information: Contains information that is seen in the TCP header, such as: sequence number, Ack number, TCP options, Rcvd windows size.

  • Flow Information: Statistics of the flow (such as total packets, total bytes, TCP flags statistics, packet length statistics, and socket statistics), interface index from which the flow was observed, start time and end time of flow.

  • In a K8s environment, the agent captures network flows from pods and hosts, and then correlates the flows and reports as related flows. This is qualified with the following CNIs:

    • Calico

    • Flannel

    • Weave

    • AKS/GKE/AWS VPC CNI

    • Openshift CNI

    • Cilium CNI


       

      Network flows are captured from pods and hosts, however, the correlation of flows is not possible when Cilium CNI is used.

In Conversation mode, the agent exports only TCP flows that are bidirectional in nature along with other connectionless flows. Conversation mode is supported for Windows, AIX, and Linux platforms. For more information on Conversation mode, see Conversation Mode.


 
  • In K8s environment, correlation of Pod or Host flows are not done in Conversation mode.

  • In either of the modes, agents do not export the following flows:

    • ARP/RARP conversations

    • Agent’s flows to collectors