Submit a ticketCall us

Don’t fall victim to a ransomware attack
Backups are helpful, but sometimes that’s not enough to protect your business against ransomware. At our live webcast we will discuss how to protect against ransomware attacks with SolarWinds® Patch Manager and how to leverage log data to detect ransomware. Register now for our live webcast.

Home > Success Center > Netflow Traffic Analyzer (NTA) > NTA 4.2.2 Administrator Guide > Device configuration examples > sFlow and J-Flow device examples > Juniper Networks sFlow and J-Flow configurations > Juniper sFlow Configuration

Juniper sFlow Configuration

Table of contents
No headers
Created by Lori Krell_ret, last modified by Alexandra.Nerpasova on Oct 21, 2016

Views: 98 Votes: 0 Revisions: 5

Last updated: July 28, 2016 

You can perform Juniper switch sFlow configuration using the following sample configuration:

sflow {
    polling-interval 30;
    sample-rate 128;
    collector 10.1.2.5 {
    udp-port 2055;
    }
    interfaces ge-0/0/0.0;
    interfaces ge-0/0/1.0;
    interfaces ge-0/0/2.0;
    interfaces ge-0/0/3.0;
    interfaces ge-0/0/4.0;
    interfaces ge-0/0/5.0;
    interfaces ge-0/0/6.0;
    interfaces ge-0/0/7.0;
    interfaces ge-0/0/8.0;
    interfaces ge-0/0/9.0;
    interfaces ge-0/0/10.0;
    interfaces ge-0/0/11.0;
    interfaces ge-0/0/12.0;
    interfaces ge-0/0/13.0;
    interfaces ge-0/0/14.0;
    interfaces ge-0/0/15.0;
    interfaces ge-0/0/16.0;
    interfaces ge-0/0/17.0;
    interfaces ge-0/0/18.0;
    interfaces ge-0/0/19.0;
    interfaces ge-0/0/20.0;
    interfaces ge-0/0/21.0;
    interfaces ge-0/0/22.0;
    interfaces ge-0/0/23.0 {
    	polling-interval 30;
        sample-rate 128;
    }
}

 
Last modified
01:40, 21 Oct 2016

Tags

Classifications

Public