Encrypted traffic analytics (ETA)
Encrypted Traffic Analytics (ETA) is a network monitoring technology that
-
leverages Flexible NetFlow (FNF) to export useful flow information to collectors,
-
enables the identification of threats and malware in encrypted traffic, and
-
operates without decryption, preserving privacy while maintaining network visibility.
ETA uses FNF technology to analyze network traffic flows, even when they are encrypted. ETA exports selected metadata about these flows to provide visibility into potential threats and anomalies, enhancing security monitoring.
ETA operation and deployment details
Wireless clients send data packets to the access point. The access point encapsulates the packets with Control and Provisioning of Wireless Access Points (CAPWAP) and sends them to the controller. The actual client data is in the CAPWAP payload. To apply ETA to client data, strip the CAPWAP header before handing the packet to the ETA module.
-
ETA leverages Flexible NetFlow (FNF) to export flow information.
-
You can use ETA analytics to identify malware.
-
ETA supports exporting records over IP Flow Information Export (IPFIX) (NetFlow version 10).
-
ETA allows you to configure a source interface for exports.
Supported features and release information
Starting from Cisco IOS XE 17.1.1s, ETA supports inspection for IPv6 traffic. ETA inspection for IPv6 traffic is enabled by default and requires no special configuration. Additional features that are available in this release include:
-
allowed list support for IPv6 traffic,
-
exporting ETA records to IPv4 or IPv6 export destinations,
-
exporting records over IP Flow Information Export (IPFIX) (NetFlow version 10), and
-
configuring a source interface for ETA exports.
You can export ETA records to IPv4 or IPv6 NetFlow collectors.
Advantages
Using ETA offers these important advantages:
-
You gain enhanced threat analytics by using telemetry data, and
-
you can use analytics with ETA to identify malware.
Export records to IPv4 flow export destination (CLI)
Enable Encrypted Traffic Analytics (ETA). Configure your device to export NetFlow records to a specific IPv4 flow export destination using CLI commands. This setup lets you monitor encrypted network traffic and forward flow data for analysis.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Enable Encrypted Traffic Analytics. Example:
|
|
Step 3 |
Configure the NetFlow record export. Example:
The value for port_number ranges from one to 65,535. |
|
Step 4 |
Return to privileged EXEC mode. Example:
|
ETA is enabled. NetFlow records are exported to the specified IPv4 destination and port.
Configure the ETA flow export destination (GUI)
Configure a flow export destination so that ETA can export NetFlow data from your network device to a specified collector.
Procedure
|
Step 1 |
Choose Configuration > Services > NetFlow. |
|
Step 2 |
Click Add. The Create NetFlow dialog box opens. |
|
Step 3 |
Choose one of the available templates from the NetFlow Template drop-down list. |
|
Step 4 |
Enter an IPv4 or IPv6 address in the Collector Address field. |
|
Step 5 |
Enter a port number in the Exporter Port field. Specify a value in the range 1 to 65535. |
|
Step 6 |
Choose the desired option from the Export Interface IP drop-down list. |
|
Step 7 |
Choose one of the sampling methods from the Sampling Method drop-down list. The available options are Deterministic, Random, and Full NetFlow. |
|
Step 8 |
Enter a sampling range between 32 and 1032. |
|
Step 9 |
Select the required interfaces or profile from the Available pane and move it to the Selected pane. |
|
Step 10 |
Click Save and Apply to Device. |
The ETA flow export destination is configured, and NetFlow traffic is exported according to the specified settings.
Enable the inactive timer (CLI)
Specify the duration after which inactive traffic flows are removed.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure encrypted traffic analytics. Example:
|
|
Step 3 |
Specify the inactive flow timeout value. Example:
The value for timeout-in-seconds ranges from 1 second to 604,800 seconds (approximately 1 second to 7 days). |
|
Step 4 |
Return to privileged EXEC mode. Example:
|
Inactive flows are removed after the specified timeout duration.
Enable ETA on WLAN policy profile
Enable Encrypted Traffic Analytics (ETA) on a WLAN policy profile to enhance visibility and detection of threats in encrypted traffic.
Procedure
|
Step 1 |
Enter the global configuration mode. Example:
|
|
Step 2 |
Create policy profile for the WLAN. Example:
The profile-name is the profile name of the policy profile. |
|
Step 3 |
Enable encrypted traffic analytics on the policy. Example:
|
|
Step 4 |
Return to privileged EXEC mode. Example:
|
ETA is enabled on the specified WLAN policy profile, allowing monitoring and analysis of encrypted traffic on the WLAN.
Attach policy profile to VLAN (GUI)
Apply policy enforcement and configuration to a VLAN.
Procedure
|
Step 1 |
Check the RADIUS Profiling checkbox. |
|
Step 2 |
From the Local Subscriber Policy Name, choose the required policy name. |
|
Step 3 |
In the WLAN Local Profiling section, enable or disable the Global State of Device Classification. |
|
Step 4 |
Check the checkbox for HTTP TLV Caching. Also, check the checkbox for DHCP TLV Caching. |
|
Step 5 |
In the VLAN section, choose the VLAN/VLAN Group from the drop-down list. Enter the Multicast VLAN. |
|
Step 6 |
In the WLAN ACL section, choose the IPv4 ACL and IPv6 ACL from the drop-down list. |
|
Step 7 |
In the URL Filters section, choose the Pre Auth and Post Auth from the drop-down list. |
|
Step 8 |
Click Save and Apply to Device. |
The policy profile is applied to the selected VLAN. The device enforces the specified settings.
Attach policy profile to VLAN
Associate a wireless policy profile with specific VLANs to enable intended network policies.
Procedure
|
Step 1 |
Enter the global configuration mode. Example:
|
|
Step 2 |
Create policy profile for the WLAN. Example:
The profile-name is the profile name of the policy profile. |
|
Step 3 |
Assign the policy profile to the VLANs. Example:
|
|
Step 4 |
Enable the wireless policy profile. Example:
|
The policy profile is now associated with the specified VLAN(s), and the wireless policy is active.
Verify ETA configuration
Verify ETA globally
To view the ETA global and interface details, use this command:
Device# show platform software utd chassis active F0 et-analytics global
ET Analytics Global Configuration
ID: 1
All Interfaces: Off
IP address and port and vrf: 192.168.5.2:2055:0
To view the ETA global configuration, use this command:
Device# show platform software et-analytics global
ET-Analytics Global state
=========================
All Interfaces : Off
IP Flow-record Destination: 192.168.5.2 : 2055
Inactive timer: 15
![]() Note |
The show platform software et-analytics global command does not display the ETA enabled wireless client interfaces. |
To view the ETA global state in datapath, use this command:
Device# show platform hardware chassis active qfp feature et-analytics datapath runtime
ET-Analytics run-time information:
Feature state: initialized (0x00000004)
Inactive timeout : 15 secs (default 15 secs)
WhiteList information :
flag: False
cgacl w0 : n/a
cgacl w1 : n/a
Flow CFG information :
instance ID : 0x0
feature ID : 0x1
feature object ID : 0x1
chunk ID : 0xC
To view the ETA memory details, use this command:
Device# show platform hardware chassis active qfp feature et-analytics datapath memory
ET-Analytics memory information:
Size of FO : 3200 bytes
No. of FO allocs : 0
No. of FO frees : 0
To view the ETA flow export in datapath, use this command:
Device# show platform hardware chassis active qfp feature et-analytics datapath stats export
ET-Analytics 192.168.5.2:2055 vrf 0 Stats:
Export statistics:
Total records exported : 5179231
Total packets exported : 3124873
Total bytes exported : 3783900196
Total dropped records : 0
Total dropped packets : 0
Total dropped bytes : 0
Total IDP records exported :
initiator->responder : 1285146
responder->initiator : 979284
Total SPLT records exported:
initiator->responder : 1285146
responder->initiator : 979284
Total SALT records exported:
initiator->responder : 0
responder->initiator : 0
Total BD records exported :
initiator->responder : 0
responder->initiator : 0
Total TLS records exported :
initiator->responder : 309937
responder->initiator : 329469
To view the ETA flow statistics, use this command:
Device# show platform hardware chassis active qfp feature et-analytics datapath stats flow
ET-Analytics Stats:
Flow statistics:
feature object allocs : 0
feature object frees : 0
flow create requests : 0
flow create matching : 0
flow create successful: 0
flow create failed, CFT handle: 0
flow create failed, getting FO: 0
flow create failed, malloc FO : 0
flow create failed, attach FO : 0
flow create failed, match flow: 0
flow create, aging already set: 0
flow ageout requests : 0
flow ageout failed, freeing FO: 0
flow ipv4 ageout requests : 0
flow ipv6 ageout requests : 0
flow whitelist traffic match : 0
Verifying ETA on Wireless Client Interface
To view if a policy is configured with ETA, use this command:
Device# show wireless profile policy detailed default-policy-profile
Policy Profile Name : default-policy-profile
Description : default policy profile
Status : ENABLED
VLAN : 160
Multicast VLAN : 0
Passive Client : DISABLED
ET-Analytics : DISABLED
StaticIP Mobility : DISABLED
WLAN Switching Policy
Central Switching : ENABLED
Central Authentication : ENABLED
Central DHCP : ENABLED
Flex NAT PAT : DISABLED
Central Assoc : ENABLED
To view the ETA status in the wireless client detail, use this command:
Device# show platform hardware chassis active qfp feature wireless wlclient datapath <client_mac>
Wlclient Details for Client mac: 0026.c635.ebf8
---------------------------------
Input VlanId : 160
Point of Presence : 0
Wlclient Input flags : 9
Instance ID : 3
ETA enabled : True
client_mac_addr : 0026.c635.ebf8
bssid_mac_addr: 58ac.7843.037f
Point of Attachment : 65497
Output vlanId : 160
wlan_output_uidb : -1
Wlclient Output flags : 9
Radio ID : 1
cgacl w0 : 0x0
cgacl w1 : 0x0
IPv6 addr number : 0
IPv6 addr learning : 0
To view clients in the ETA pending wireless client tree, use this command:
Device# show platform hardware chassis active qfp feature wireless et-analytics eta-pending-client-tree
CPP IF_H DPIDX MAC Address VLAN AS MS WLAN POA
-----------------------------------------------------------------------------
0X2A 0XA0000001 2c33.7a5b.827b 160 RN LC xyz_ssid 0x90000003
0X2B 0XA0000002 2c33.7a5b.80fb 160 RN LC xyz_ssid 0x90000003
To view the QFP interface handle, use this command:
Device#
show platform hardware chassis active qfp interface if-handle <qfp_interface_handle>
show platform hardware chassis active qfp interface if-handle 0X29
FIA handle - CP:0x27f3ce8 DP:0xd7142000
LAYER2_IPV4_INPUT_ARL_SANITY
WLCLIENT_INGRESS_IPV4_FWD
IPV4_TVI_INPUT_FIA >>> ETA FIA Enabled
SWPORT_VLAN_BRIDGING
IPV4_INPUT_GOTO_OUTPUT_FEATURE (M)
Protocol 1 - ipv4_output
FIA handle - CP:0x27f3d30 DP:0xd7141780
IPV4_VFR_REFRAG (M)
IPV4_TVI_OUTPUT_FIA >>> ETA FIA Enabled
WLCLIENT_EGRESS_IPV4_FWD
IPV4_OUTPUT_DROP_POLICY (M)
DEF_IF_DROP_FIA (M)
![]() Note |
The qfp_interface_handle ranges from 1 to 4294967295. |
To view the ETA pending wireless client tree statistics, use this command:
Device# show platform hardware chassis active qfp feature wireless et-analytics statistics
Wireless ETA cpp-client plumbing statistics
Number of ETA pending clients : 2
Counter Value
-------------------------------------------------------------------
Enable ETA on wireless client called 0
Delete ETA on wireless client called 0
ETA global cfg init cb TVI FIA enable error 0
ETA global cfg init cb output SB read error 0
ETA global cfg init cb output SB write error 0
ETA global cfg init cb input SB read error 0
ETA global cfg init cb input SB write error 0
ETA global cfg init cb TVI FIA enable success 0
ETA global cfg uninit cb ingress feat disable 0
ETA global cfg uninit cb ingress cfg delete e 0
ETA global cfg uninit cb egress feat disable 0
ETA global cfg uninit cb egress cfg delete er 0
ETA pending list insert entry called 4
ETA pending list insert invalid arg error 0
ETA pending list insert entry exists error 0
ETA pending list insert no memory error 0
ETA pending list insert entry failed 0
ETA pending list insert entry success 4
ETA pending list delete entry called 2
ETA pending list delete invalid arg error 0
ETA pending list delete entry missing 0
ETA pending list delete entry remove error 0
ETA pending list delete entry success 2

Feedback