3. Choosing a Method of Traffic Monitoring¶
A Wanguard Sensor refers to a Sensor component licensed with a Wanguard license, enabling full functionality including DDoS detection and mitigation. A Wansight Sensor is a Sensor component licensed with a Wansight license, which focuses on traffic monitoring only, without DDoS-related features.
The term Sensor encompasses four software components that share a similar feature set but differ in how they gather traffic information:
► Flow Sensor analyzes Netflow® (including jFlow, NetStream, cflowd), sFlow®, and IPFIX flow packets. Routers and switches can export aggregated traffic data as flows to Flow Sensor, significantly reducing the volume of data sent compared to raw traffic. This makes Flow Sensor ideal for monitoring remote or high-traffic networks. The trade-off is a certain delay in reporting real-time statistics due to flow-based aggregation.
► Packet Sensor analyzes IP packets directly. It can be deployed in-line within the main data path or connected to a mirrored port or network TAP. In switched networks, a Packet Sensor sees only traffic directed to its network interface. When not deployed in-line, a TAP or a device with a “monitoring” or “mirroring” port must be used to forward copies of the desired traffic. Packet Sensor provides detailed, packet-level visibility without the delays inherent in flow-based methods.
► SNMP Sensor monitors bandwidth usage on a per-port basis via the SNMP Protocol. This approach queries network devices (such as routers, switches, and servers) to retrieve interface traffic counters. Although SNMP offers only basic bandwidth measurements without IP-level details, it is resource-efficient and introduces minimal load on the network and devices.
► Sensor Cluster aggregates existing Sensor data (from Packet Sensors, Flow Sensors, and SNMP Sensors) into a unified domain for anomaly detection and IP-level graphing. By summing up traffic data from multiple Sensors, a Sensor Cluster enables consolidated visibility, anomaly detection, and reporting across various traffic collection points.
3.1. Comparison between Packet Sniffing, Flow Monitoring, and SNMP Polling¶
Packet Sensor |
Flow Sensor |
SNMP Sensor |
|
---|---|---|---|
Traffic Monitoring Technology |
Sniffing packets passing an in-line appliance; Port mirroring (SPAN, Roving Analysis Port); Network TAP |
NetFlow version 5, 7 and 9 (jFlow, NetStream, cflowd); sFlow version 4 and 5; IPFIX |
SNMP version 1; SNMP version 2c; SNMP version 3 |
Maximum Traffic Capacity per Sensor |
100 GigE |
multiples of 100 Gbps |
multiples of 100 Gbps |
DDoS Detection Time |
≤ 1 seconds |
≥ flow ageing time (≥ 1-30 seconds usually) |
≥5 seconds |
IP Graph Granularity |
≥ 5 seconds |
≥ 20 seconds |
N/A (SNMP offers no details about IPs) |
Traffic Validation Options |
IP classes, MAC addresses, VLANs, BPF |
IP classes, Interfaces, AS Numbers, Ingress/Egress |
Interfaces |
Packet Dumps |
Yes |
No |
No |
Flow Collector |
No |
Yes |
No |
Packet Sensor is recommended when real-time DDoS detection is essential or when raw packet captures are required for forensic analysis and troubleshooting. Because it inspects every packet entering the network, a Packet Sensor must typically run on a high-performance server.
Flow Sensor processes pre-aggregated traffic data exported by routers and switches. This approach enables a single Flow Sensor to monitor multiple high-speed interfaces (10/40/100 GbE) using lower-end hardware. However, Flow Sensor has several drawbacks:
✘ Delayed Visibility: Flow data is aggregated over time, introducing a flow-aging delay before traffic patterns become visible. This slower detection speed can affect real-time responsiveness.✘ Reduced Accuracy: Because data is often sampled rather than capturing every packet, traffic readings may be slightly less accurate.✘ Increased Device Load: Enabling flow export can raise CPU usage on the network device if flow processing isn’t hardware-accelerated.✘ Risk of Dropped Flows: During large, spoofed DDoS attacks that saturate the device’s TCAM, flow records can be lost.
SNMP Sensor is useful primarily for monitoring devices that cannot export flow data or mirror packets, or for verifying the accuracy of flow-based statistics. While it provides only basic interface-level bandwidth information, comparing SNMP metrics with flow data can help ensure data integrity.
Note
Flow Sensors and Packet Sensors can be deployed together to achieve redundancy and high availability. Using both technologies simultaneously provides a richer dataset—packet captures for forensic analysis and flow records for efficient long-distance monitoring.