Traffic Insights Configuration Guide
Last updated
Last updated
Traffic Insights minimum configuration requirements consist of enabling a ThousandEyes Enterprise Agent to accept Traffic Insights data, conducting SNMP discovery of the devices that will send flow data, and configuring and allow-listing a network flow traffic monitor to send the correct record formats to ThousandEyes.
Optionally, you can configure subnet tags inside of ThousandEyes to enhance the ThousandEyes data views.
Before you begin any configuration, see for information about the minimum requirements of the components configured in the steps below.
To complete the configuration steps in this section, you need access to:
Your own enterprise network configuration systems, and/or the network device command line interface (CLI).
The ThousandEyes platform and user interface, with an Organization Admin or Account Admin role.
Enable the network flow forwarder on the Enterprise Agent under Network & App Synthetics > Agent Settings > Enterprise Agents. After choosing an agent to edit, go to the Advanced Settings tab, scroll down to Agent Modules, and click the Enable button.
In order to better correlate between ThousandEyes data views for Network & App Synthetics and the data views for Traffic Insights, you must discover the devices that you designate as your traffic monitors from an Enterprise Agent on your network. SNMP device discovery is necessary to unlock device identification features such as the device name (like ISR4451cEdge) and interface type (like GigabitEthernet0/0/2) that are sending flow data; otherwise, only the device IP address is shown in the Traffic Insights views. Additionally, if the device shows up as a node in the path visualization of a test and there are network flows going from it to an Enterprise Agent with Traffic Insights enabled, you can simply click on the device to take you directly into a filtered view in Traffic Insights for a deeper dive into that device's current metrics.
Enterprise Agents poll your network devices using the Simple Network Management Protocol (SNMP). The Enterprise Agent you use to discover the network devices does not have to be the one you designated as the flow forwarder you configured in step 1.
In addition to all the other steps, you may need to enable Access Control Lists (ACLs) for the network device that is serving as the traffic monitor for Traffic Insights. You need to allow the ThousandEyes Enterprise Agent to discover this network device and to receive flow data.
Success Criteria: Enabled Enterprise Agent has discovered the device and it is visible in the Devices table.
This section describes tasks related to setting up flow exporting within traffic monitors from your network to ThousandEyes. Some of these configuration tasks are performed within your enterprise network, while others are done on the ThousandEyes platform.
Below are example steps for manually configuring NetFlow on Cisco IOS-XE devices using a command-line interface (CLI).
The flow exporter's IP address needs to be unique within your network. While the IP address need not be “dedicated” solely to Traffic Insights – the device can use the IP address for other purposes – it just means that your exporting interfaces should be assigned with IP addresses that don't overlap with other IP addresses in your network.
Create IPv4 Record:
Create the IPv6 record:
Create the IPv4 monitor:
Create the IPv6 flow monitor:
Optional: If you want to get IPv6, attach the IPv6 flow monitor to all interfaces.
There are a different set of Netflow configuration steps needed specifically for Cisco SD-WAN environments. For SD-WAN you need to configure a centralized Cflowd policy.
Locate the centralized default policy in your Cisco SD-WAN manager. If you do not have one, you need to create one. In the following example, you create a policy called “Default_Central_Policy”.
Go to Configuration > Policies > Centralized Policies > Default_Central_Policy.
Select “...”.
Click Edit.
Select Traffic Rules as shown in the figure above.
Select the Cflowd tab.
Click Add Policy.
In the Cflowd Policy screen, fill in the following fields:
Name: Enter a policy name, in this example we use ThousandEyes-ETM.
Description: Enter a simple description for the policy.
Active Flow Timeout: 60
Inactive Flow Timeout: 15
Flow Refresh: 120
Sampling Interval: 1
Protocol: IPv4 (an additional policy can be created for IPv6).
Click New Collector and fill in the following fields:
VPN ID: Use the VPN that will send traffic to the cflowd collector.
IP Address: IP of the ThousandEyes Enterprise Agent that has Traffic Insights enabled.
Port: 18089 (that can be customized for example 9995).
Source Interface: Type the interface that will send Cflowd records to the ThousandEyes Enterprise Agent collector/forwarder. Use the dropdown to help select the interface type.
Click Add.
Click Save Cflowd Policy.
To apply the Cflowd policy to sites:
Select Policy Application.
Click the Cflowd tab.
Click the + New Site List.
Select your site(s) from the popup list.
Click Add.
Click Save Policy Changes to update your policy.
Below is a command-line example of the Cflowd configuration; the IP address 192.168.100.176 and port 18089 refer to the Enterprise Agent that has been enabled as a network flow collector/forwarder.
Additionally, the command **show sdwan app-fwd cflowd statistics**
can be used to verify flow statistics.
There may be subtley different ways to set up a traffic monitor via the Meraki Dashboard depending on the device you use. General steps include:
Log into the Meraki admin console.
Navigate to Network-wide > Configure > General.
Allow SNMP access (you may also need to type in the community name).
Set NetFlow traffic Reporting or NetFlow Collector to "Enabled".
In the NetFlow collector IP field, enter your Traffic Insights forwarder IP address.
In the NetFlow collector port field, enter 18089.
Click Save.
Note that network flow data must already be streaming to the Enterprise Agent in order for the traffic monitor’s network device to appear as an option for allow-listing.
You only need to allow-list one traffic monitor per Enterprise Agent.
Before exporting network flow data, you need to install or designate a ThousandEyes Enterprise Agent within your network. Then, on the ThousandEyes platform, you need to configure the agent to recognize and pass along the exported flow data so it can be ingested into the ThousandEyes platform. Refer to for information on installing the Enterprise Agent within your enterprise network.
If you do not yet have a supported Enterprise Agent to use as a flow forwarder, you can install an Enterprise Agent directly from the ThousandEyes Platform. See for information about supported agents, and the relevant article in the Enterprise Agent section for installation instructions.
If you already have Enterprise Agents installed, and want to designate one as a forwarder, see .
Refer to for more information.
Success Criteria: The Enterprise Agent has Traffic Insights enabled and is visible on the .
Find instructions for device discovery at .
See the Cisco documentation titled for instructions to set up and configure Cflowd. Refer to the example below to create a Cflowd policy for your sites.
For Cisco SD-WAN environments that use Cisco Catalyst SD-WAN, see .
Transport Protocol: TCP or UDP (this must match the ThousandEyes Enterprise Agent collector/forwarder settings in ).
You need to update your firewall settings in the Meraki dashboard to allow SNMP polling from the IP address of the appropriate Enterprise Agent forwarder. See Meraki's for more information about allowing SNMP polling.
For more information about configuring Meraki devices for network flow, see Meraki's .
Success Criteria: Traffic monitor is visible for allow-list selection. The device should appear on the screen in .
This step allows the forwarding Enterprise Agent to recognize and accept the network flow data from the newly configured traffic monitor (flow exporter). The forwarder needs the allow-list in order to accept flow data from your exporter. Go to Traffic Insights > Settings > Traffic Monitors and click Allow All. See for more in-depth guidance on allow-listing your traffic monitors.
In cases where a proxy is needed, add the configuration on the Enterprise Agent as described in .
This optional step is performed in the ThousandEyes platform if you want to be able to see network traffic flows by subnet. See for screens and further instructions.
Get your flows sent to another flow collector for ingestion into additional newtork flow analysis tools. See for more information.