NetFlow Generation

Take the pressure off routers and switches with more efficient NetFlow.

NetFlow: Gain Visibility. Take Control.

NetFlow is an efficient method for delivering basic Layer 2–4 network traffic data to analysis tools. But extracting high-quality NetFlow using routers and switches can severely strain resources, leading to dropped packets. Other problems include reduced accuracy by relying on sampling and restricted interoperability due to limited format options.

The GigaSMART® NetFlow module overcomes these roadblocks by automatically generating NetFlow records and exporting them to your SIEMS, storage platforms and other tools. NetFlow from Gigamon has these advantages: 

  • Offloads NetFlow generation load from routers and switches
  • Provides full fidelity NetFlow intelligence vs. information derived from sampled packets
  • Supports all formats, including IPFIX and CEF

Gigamon NetFlow provides network and security teams with visibility into traffic types across systems, including multi-cloud environments. This helps organizations catch denial of service attacks, data exfiltration and other security-related activities. Similarly, network- and application-performance management (NPM and APM) tools can quickly troubleshoot and remediate user experience concerns and ensure SLAs. 

NetFlow is now part of our new bundled GigaSMART apps offer.

Want to take NetFlow to the next level?

Expand your metadata choices to over 5,000 attributes and obtain Layer 7 insights. These include details on hundreds of social media, database, ICS, financial and many other types of applications. Find out how using Gigamon Application Metadata Intelligence.

Customers Have Saved Millions

See how much you can save with Gigamon.


Our Partnerships

GigaSMART Features

GigaSMART® offers a number of other essential traffic intelligence services required for active visibility into infrastructure blind spots, including:

NetFlow Generation

Delivering basic Layer 2–4 network traffic data to analysis tools. 

Advanced Flow Slicing

Eliminates these issues by slicing payloads and packets from long data flow.

Source Port Labeling

Provides context to packets and allows tools to properly assess network behavior and threats based on where they are.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.

SSL/TLS Decryption

Creates a secure channel between the server and the end user's computer or other devices as they exchange information.

Packet Slicing

Truncates packets while preserving the portion of the packet (the protocol headers) required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools, so network and security visibility can scale.


Targets, identifies and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.


Provides customizable data protection by overwriting specific packet fields with a set pattern. 


Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or hosted in a public cloud.

Application Visualization

Provides a complete view of the applications running on your network automatically.

Application Filtering Intelligence

Extends Layer 7 visibility to thousands of common and proprietary applications.

Application Metadata Intelligence

Empowers your security information and event management and network performance monitoring tools.

GTP Correlation

Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.

5G Correlation

Intelligently forward subscriber sessions to specific tools by filtering on subscriber, user device, RAN or network slice IDs.

FlowVUE Flow Sampling

Provides subscriber IP-based flow sampling.

SIP/RTP Correlation

Enables enterprises and service providers to monitor VoIP traffic.

See what your peers are talking about in the Gigamon Community

Learn more about NetFlow Generation and connect with other Gigamon users to ask questions and share use cases and deployment examples.


Have Questions?

We're here to help you find the right application visibility solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages