Traffic validation (ENTV)
Use ENTV to validate Sensor traffic quality and troubleshoot capture issues.
Summary
The Enhanced Network Traffic Validation (ENTV) feature became available at the CLI of Vectra Brains in v7.8. The graphical user interface (GUI) for ENTV shipped for RUX deployments in June 2025 and is available for QUX deployments starting in the v9.3 release. If you are unsure of your deployment type, please see Vectra Analyst User Experiences (Respond vs Quadrant).
ENTV allows customers to see information related to the network traffic observed by sensors paired to the Brain appliance. This information is used to determine if the network traffic being observed meets quality standards required for detection and further processing. This article gives an overview of the feature, terminology, and advice on how to get started.
Frequently Asked Questions (FAQ)
How is the WebUI different than the downloadable report?
The ENTV WebUI presents the same data as the downloadable report but highlights the most common and critical troubleshooting items for quick access. If you need additional detail, you can download the full report. The WebUI is designed to improve usability and eliminate the need to parse raw JSON manually.
What do the labels in the WebUI mean?
Each metric in the WebUI has a tooltip icon beside the label. Hovering over the icon will show a brief explanation of what the data means. Since the WebUI and downloadable report use the same metrics, you can also refer to the chart below for additional definitions. The labels in the WebUI and downloadable report are named similarly for consistency.
What do the colored values on the WebUI indicate?
Vectra has defined thresholds for certain data points in the WebUI based on their importance and the likelihood of impacting system functionality. Red or yellow indicators suggest potential issues that should be reviewed with your Vectra CSM or Account team. The thresholds for these metrics are based on rules of thumb and best practices but should not be considered absolutes. If in doubt, please contact Vectra for advice.
Yellow indicates a warning level - depending on your configuration and network, it may or may not be possible or necessary to eliminate all yellow warnings.
Red indicates a critical level - it is recommended to address issues in these areas.
Who should I contact with questions regarding the WebUI/Report data?
Your Vectra CSM or Account team is available and happy to help with any questions you may have.
Overview
Enhanced Network Traffic Validation allows customers to see information related to the network traffic observed by Sensors paired to the Brain. This information is used to determine if the network traffic being observed meets quality standards required for detection and further processing. ENTV analyzes the network traffic Sensors are monitoring and reports statistics over a selectable time range in the past 24 hours.
ENTV is useful for debugging Detect for Network's integration into the customer environment. It can help identify issues like TCP or DNS asymmetry, incorrect or unnecessary traffic being observed, and other traffic problems that can diminish effectiveness such as duplicate packets or unsupported encapsulations. ENTV can also help to validate expected protocol mixes on a per sensor or subnet basis. When validating ENTV data, it is important to have someone from the network team available to assist who may understand what should be seen by Vectra's Sensors.
ENTV vs Topo and NTV Stats
New customers can ignore this section and just focus on ENTV and other tooling mentioned in the General Network Traffic Validation Process below. ENTV replaces older tools such as NTV Stats and Topo that you may have run previously. NTV Stats and Topo were available to customers on unpublished URLS on your Vectra Brain appliances. These tools were often shared with customers by Vectra SEs. For customers using the Respond UX served from the Vectra cloud platform, ENTV is the only similar tool available. NTV Stats and Topo are still available when using the Quadrant UX served by the Vectra appliance platform but may be fully deprecated in the future. It is recommended to only use ENTV moving forward as Topo and NTV Stats are not actively maintained.
Using the ENTV GUI (WebUI)
Navigate to Network Stats in your Vectra GUI. This is in the Traffic Validation section.

Here you will find three new options:
Aggregate Traffic - shows data from all paired network sensors
Summary
Packet Direction
L7 Protocols
L4 Protocols
Top VLANS for Duplication
Unprocessed Traffic
Per Sensor Traffic - shows data on a per sensor basis
Summary
Top flows for the following
TCP Asymmetry
DNS Asymmetry
Out to Out
Out to In
Packet Direction
L7 Protocols
L4 Protocols
Unprocessed Traffic
Per Subnet Traffic - shows data on a per /24 subnet basis
Flow Direction - shows the amount of traffic in the subnet that is communicating with the Internet, between subnets (Inter-subnet), and within the specified subnet (Intra-subnet)
Some widgets on the various pages will allow downloading of just the data being presented in the widget. For example:

In the above example, clicking on the download icon (pointed to by the green arrow) will download a .json of just the Top Flows (all options such as TCP Asymmetry, DNS Asymmetry, Out to Out, and Out to In will be included).
Downloading a JSON Report from the GUI
While the CLI allows you to customize the output (see below), you can generate and download a full report of ENTV data using the GUI.
Navigate to Network Stats > Aggregate Traffic in your Vectra GUI. This is in the Traffic Validation section.
Click Download Full Report.

The page will pivot to a Traffic on Network Sensors page.

Use the Generate a new Report button to create a new report if the Report Generated message at the bottom indicates a date too far in the past for your desired use.
This should complete in less than 15 minutes for all deployments.
Actual completion time will vary based on the size of your deployment.
You can come back later to find the new report ready for download.
Use the Download Report button to download the report.
General Network Traffic Validation Process
Once you have paired Sensors to your Brain and directed traffic to the capture ports on the Sensors, the next step is to validate that traffic flow and identify if there are any issues that may need to be addressed with the capture configuration.
Validate that packets are being observed at the capture port of the Sensors:
Log in to the Sensor(s) CLI using the "vectra" account and execute the "show traffic stats" command.
Additional information about this command is available in the Troubleshooting interface and Ethernet errors article.
Execute this command several times in a row and if you see Packets Received going up, then you know you are receiving packets and can move on to using ENTV to validate what your Sensor is passing on to the Brain for further processing.
show traffic stats -ewill show extended statistics that may be helpful in troubleshooting physical or other low layer issues.It can take a few minutes for traffic observed to be reflected in your user interface at Network Stats but once available, this area of the UI will also show network related statistics.
ENTV retains metrics for 24 hours, by default it returns results aggregated over the last hour.
You may wish to wait until your Sensors have collected data for a while to get a good picture of what they are seeing before digging in to ENTV analysis.
Use ENTV to show any alarms (red or yellow in the GUI) that are present
Alarms represent metrics that are out spec with norms set by Vectra.
These thresholds may be altered by Vectra as part of the software update process so we do not specify baselines in this article.
When alarms are present, dig into ENTV data on a page and widget basis depending on what you are looking for (what you want to investigate).
Once the issues have been identified, work with your network team and Vectra to determine the best path forward.
ENTV CLI Command Syntax
Using the ENTV CLI
The ENTV CLI is only available on Vectra Brain appliances. While Sensors that are paired to the Brain produce the data used by ENTV, querying ENTV is only possible from Brains. ENTV produces more statistics than what is easy for a human to digest at a glance.
Running alarms for all pages, Sensors, and subnets
Use the
--all-alarmsswitch.
Hurray!! We have no alarms present and do not need to dig in further unless curious.
To output metrics and alarms for only a specific page use the
--run-alarmsswitch when specifying a page name with the--page-name <Page Name>switch.To check for alarms on only a specific page, use the
--only-alarmsswitch when specifying a page name with the--page-name <Page Name>switch.
Metrics Used in Alarms (Alarm Definitions)
tcp_asymmetryA substantial percentage of TCP traffic is only observed in one direction. Both directions of a session need to be observed on the same sensor. Consider repositioning what traffic is sent to the sensor.
dns_asymmetryA substantial percentage of DNS traffic is only observed in one direction. Both directions of a session need to be observed on the same sensor. Consider repositioning what traffic is sent to the sensor.
out_to_inA substantial percentage of traffic is coming from non-internal IP addresses. This could indicate a sensor is listening to DMZ traffic, or that some WAN IPs should be considered internal if they are controlled/owned by the customer's remote office. See sensor-expanded for out_to_in details.
out_to_outAnon-zero percentage of traffic has no internal source or destination. Consider reconfiguring internal subnets to include this traffic or not including this traffic to the sensor. See sensor-expanded for out_to_out details.
traffic_errorsAsubstantial percentage of traffic is being dropped due to either unsupported transport/network/encapsulation protocols, corrupted traffic, or performance issues. See aggregate page, asymmetry widget.
unsupported_pctA substantial percentage of traffic has ethertypes that Vectra cannot process. Please consider a different encapsulation strategy for packets forwarded to the sensor. See encapsulation details under aggregate page, unsupported-encapsulations widget.
Time
ENTV retains metrics for 24 hours. By default, it returns results aggregated over the last hour. You can query within the 24 window for a specific end-time and period using the following arguments:
--end-time(ISO 8601 format i.e.
2023-05-10T08:15:00)
--report-len(number of seconds)
Metrics are sent from Sensors at 5 minute intervals. It is recommended to make report_len >= 300 to ensure at least one set of values is captured.
Pages and Widgets
To keep related information together, statistics are divided into pages and those pages may further be divided into widgets.
aggregate
-
Broadest overview page, containing all aggregate widgets plus duplication information. Statistics are combined across all sensors with information about asymmetry, unsupported encapsulations, directionality, duplication, and protocol analysis. This contains the main summary base_stats and two supporting reports sensors, and top_flows_duplication.
The base_stats main summary report contains aggregate network data, in these sections:
l7_protos- ISO model level 7 protocol packet counts and percentages.l4_protos- ISO model level 4 protocol packet counts and percentages.misc_metricsduplicate_pct- percent of total traffic that is duplicate.If a substantial percentage of duplicate traffic is observed, the Brain can deduplicate metadata received from multiple sensors but this consumes resources that could be used to process higher loads of non-duplicate traffic. Consider finding the source of duplication and resolve it upstream from the Vectra Sensors.
duplicate_pkt- total packet count of traffic that is duplicate.tcp_destruct_with_holes- indicates a count of TCP streams that have one or more missing packets in them. This should not be possible according to the TCP protocol, and so it is likely that the customer sensor has missed one or more packets.total_packet_counts- total packets included in the sample traffic that ENTV captured for this report.
flow_dir– percents and packet counts for traffic flows in a given direction.unsupported_encapsulations- percent of packets with unsupported ethertypes.nic_errors- errors that occurred from DPDK on the Network Interface Card itself on a given sensor.These are grouped by
sensor_luidand include thenic_name.ierrors- Very infrequent typically (almost never happen). Malformed low-level packet count, like runt ethers or wrong CRCs, which are usually caught before hitting the NIC.imissed- Notably,imissedindicates packets that were dropped due to the NIC being overloaded (too much traffic). If there are NIC errors, this is usually where it happens.rx_nombuf- Number of failures to initialize memory buffers in mempools. Rarely happen.
traffic_errors- the percentage of packets that the system was unable to process.unsupported_trafficunsupported_ip_proto_dropsnon_ip_drops
unsupported_traffic_pct- percentage of packets not processed because of unsupported transport or network protocol.internal_constraints_mainPercentage of packets not processed because of performance constraints (traffic needs to be reduced, too much IP fragmentation) or due to packet truncation. Generally represents drops that can more easily corrected by adjusting customer environment.
fwdd_hw_drops(forwarding-daemon hardware drops - this is Hardware Drops: NIC Overflow in the GUI) - sum of packets dropped due toimissedandrx_nombuffrom all network interfaces for a given sensorfwdd_sw_drops(forwarding-daemon software drops - this is Software Drops: Ingestion Overload in the GUI) - sum of packets dropped because internal processes were unable to keep up (talk to Vectra support).ip_fragmentation_mem_alloc_dropspkt_too_short_drops
The sensors supporting report breaks down statistics per-sensor sensor_list, as well as combined statistics across all sensors aggregate. For the details of those sections, see the summary widget below, since it fetches the same data.
The top_flows_duplication supporting report gives percents and counts for flows of duplicated packets within the network.
aggregate
summary
Summary includes:
dns_asymmetryout_to_inout_to_outtcp_asymmetrytraffic_errors- the percentage of packets that the system was unable to process. Look at the following fields for breakdown of cause:unsupported_traffic_errors- percentage of packets not processed because of unsupported transport or network protocol.internal_constraints_main_errors- percentage of packets not processed because of performance constraints (traffic needs to be reduced, too much IP fragmentation) or due to packet truncation. Generally represents drops that can more easily corrected by adjusting customer environment.unsupported_encapsulations- percent of packets with unsupported ethertypes. Check unsupported-encapsulations widget for details.
aggregate
unsupported-encapsulations
Metrics about ethertypes observed that we don't support, broken down by ethertype:
unsupported_pct- percent of all packets have unsupported ethertypes. Checkpct_of_unsupportedand the sensor-collapsed page for details.unsupported_ethertypes- a list of observed ethertypes that are not supported. Notably, check thepct_of_unsupportedfield on each entry for the percent of unsupported ethertypes that are that particular ethertype.
aggregate
flow-direction
Metrics about packets bucketed by source_destination: in_in_pct (percent), in_in_pkt (packet count), in_out_pct, in_out_pkt , out_in_pct, out_in_pkt , and out_out_pct, out_out_pkt.
aggregate
l4-protocols
Percent / count of packets that are TCP, UDP, ICMP, or other.
aggregate
l7-protocols
Percent / count of packets that are HTTP, DNS, SSL, Kerberos, or other.
aggregate
duplication
Percent of duplicate packets, bucketed by VLAN with most duplicate traffic.
pct_of_anomalous - the contribution of this particular VLAN to the overall duplication.
aggregate
protos-and-directions
This is a composite widget. It will return the aggregate page's flow-direction , l4_protos , and l7_protos widgets' output in a list.
sensor-collapsed
-
Per-sensor summary statistics for all sensors. Per-sensor statistics are in the sensor_list sub-section, while combined statistics are in the aggregate sub-section. Each section contains summary percent summary_pcts and summary packet summary_pkts sections, for the following keys:
dns_asymmetryout_to_inout_to_outtcp_asymmetrytraffic_errorsunsupported_traffic_errorsinternal_constraints_main_errorsinternal_constraints_other_errorsunsupported_encapsulations
sensor-expanded
-
Per-sensor detailed statistics.
Requires --sensor <LUID>" parameter, which may be set to --all for statistics on all sensors.
For a given sensor, reports are:
base_stats: same as theaggregatepage above'sbase_stats report, but only for this sensor.A set of top flows reports, which list the top N flows that exhibit different kinds of problems. Each has the same format. Those reports are:
top_flows_tcp_asymmetrytop_flows_dns_asymmetrytop_flows_out_to_outtop_flows_out_to_in
Top flow report format:
A
total_anomalous_pctvalue that gives the percentage of all flows that match this criteriaA
tops_listarray that lists out the flows, which contains report-specific entries. The entry contains, among other things, apct_of_anomalousvalue that indicates how much of the problem this particular element is responsible for.
sensor-expanded
tcp-asymmetry
For a given --sensor , return top flows that exhibit TCP asymmetry.
sensor-expanded
dns-asymmetry
For a given --sensor , return top flows that exhibit DNS asymmetry.
sensor-expanded
out-to-in
For a given --sensor , return top flows in the out-to-in direction.
sensor-expanded
out-to-out
For a given --sensor , return top flows in the out-to-out direction.
sensor-expanded
unsupported-encapsulations
For a given --sensor , return unsupported encapsulation statistics, including a list of unsupported ethertypes. See above section on unsupported encapsulations for more information.
sensor-expanded
flow-direction
For a given --sensor , return percents and packet counts for flow directions (in/out → in/out).
sensor-expanded
l4-protocols
For a given --sensor , return ISO model level 4 protocol packet counts and percentages.
sensor-expanded
l7-protocols
For a given --sensor , return ISO model level 7 protocol packet counts and percentages.
sensor-expanded
protos-and-directions
This is a composite widget. For a given --sensor , return the output of the flow-direction, l4-protocols, and l7-protocols widgets.
subnet-collapsed
-
Information about top subnets. The subnet_list sub-section is a list of subnets. Each contains:
latest_host_count- how many hosts were observed on this subnet, as counted in the host session table. The number of hosts that are active fluctuates, and this value gives how many there were the last time we checked.tcp_asymmetry- tcp asymmetry on this subnet.sensors- list of sensors (by luid) that observed this subnet.
subnet-expanded
-
Per-subnet detailed statistics.
Requires "--subnet <SUBNET>" parameter, which may be set to "__all__" for all subnets.
For a given subnet, the report contains:
internet- percent of traffic that communicates outside an internal subnet.intra_subnet- percent of traffic that does not leave the subnet.inter_subnet- percent of traffic that leaves the subnet.
Tips
Sensor Luid's can be seen at the Brain CLI using the
show sensorscommand.This will show the name of the Sensor which, if set by the admin, will typically be more familiar than the Luid.
Last updated
Was this helpful?