What is the best netflow analyzer to verify bandwith utilization ?

Dear Friends
what is the best netflow trafic analyzer to check the bandwith utilization for each host?
how im can receive email for high taffic ?
obs : im need the best software and that can show the at last month
im like the manage engine netflow analyzer , but im dont know how im can identify and rename the interfaces
http://demo.netflowanalyzer.com/netflow/jspui/application.jsp?iI=935&app=SourceIN&groupID=-1&showIN=true&ipgroup=&ipGroupName=&view=global&bussView=
Thanks
Almir

938864 wrote:
Hi Kayaman,
Sorry but I don't agree with you on verification part, Why not I can verify it ? to me default means value when I don't specify -Xms and -Xmx and by the way I was testing that program on 32 bit JRE 1.6 on Windows. I am also curious significant difference between 128MB and 870MB I saw, do you see anything obviously wrong ?That spec is outdated. Since Java 6 update 18 (Sun/Oracle implementation) the default maximum heap space is calculated based on total memory availability, but never more than 1GB on 32 bits JVMs / client VMs. On a 64 bits server VM the default can go as high as 32gb.
The best way to verify ANYTHING is to address multiple sources of information and especially those produced by the source, not some page you find on the big bad internet. Even wikipedia is a whole lot better than any random internet site IMO. That's common sense, I can't believe you put much thought into it that you have to ask in a forum.

Similar Messages

  • What is the best BPM analyzer?

    What is the best BPM analyzer out there for Windows and Itunes?...I have 70,000 songs so would like a fast analyzer.

    Bobby,
    We can't say what is the best, but the other popular one to use in iTunes besides Mixmeister (referenced by Local Stain) is beaTunes BPM Detection:
    http://www.beatunes.com/itunes-automatic-bpm-detection.html

  • What is the best way to verify default heap size in Java

    Hi All,
    What is the best way to verify default heap size in Java ? does it vary over JVM to JVM . I was reading this article http://javarevisited.blogspot.sg/2011/05/java-heap-space-memory-size-jvm.html , and it says default size is 128 MB but When I run following code :
    public static void main(String args[]) {
    int MB = 1024*1024;
    System.out.println(Runtime.getRuntime().totalMemory()/MB);
    It print "870" i.e. 870 MB.
    I am bit confused, what is the best way to verify default heap size in any JVM ?
    Edited by: 938864 on Jun 5, 2012 11:16 PM

    938864 wrote:
    Hi Kayaman,
    Sorry but I don't agree with you on verification part, Why not I can verify it ? to me default means value when I don't specify -Xms and -Xmx and by the way I was testing that program on 32 bit JRE 1.6 on Windows. I am also curious significant difference between 128MB and 870MB I saw, do you see anything obviously wrong ?That spec is outdated. Since Java 6 update 18 (Sun/Oracle implementation) the default maximum heap space is calculated based on total memory availability, but never more than 1GB on 32 bits JVMs / client VMs. On a 64 bits server VM the default can go as high as 32gb.
    The best way to verify ANYTHING is to address multiple sources of information and especially those produced by the source, not some page you find on the big bad internet. Even wikipedia is a whole lot better than any random internet site IMO. That's common sense, I can't believe you put much thought into it that you have to ask in a forum.

  • What is the best antivirus software for a Macbook Pro...I recently received a message from Google that someone made an attempt to hack into my mail account so I needed to change my PW and verify myself as the user.  The message suggested that I run a scan

    What is the best antivirus software for a Macbook Pro...I recently received a message from Google that someone made an attempt to hack into my mail account and I needed to change my PW and verify myself as the user.  The message suggested that I run a virus scan to check for sny malware or other types of viruses.  I do not have any software for this and up until now have not had a problem....any help is appreciated.  I would like a simple but effective solution!

    It's worth noting that if your Gmail has been hacked, it would likely have nothing to do with your MacBook.  Hacking web based email is fairly common and it doesn't require any access to your machine whatsoever.  In the same way that you can simply go to the Gmail webpage through any browser, any hacker can use the same method.  It doesn't mean your machine has been compromised in any way (and it has likely not been).  I have never received an email from Google of this nature.  I have received notifications when someone has attempted to create an account with my name in which they basically say that there is no action required if you're the rightful owner.

  • What is the best tools for analyzer VoIP

    I need ur help, i looking the tool helps analyzer VoIP in WAN/TDM. What is the best tool for Cisco System or wich recommends.
    Thxs!

    Hey turbot,
    Thanks for contacting National Instruments support.  Each set of the vis you mention are the latest, and some use similar methods to do the FFT than the other.  The SMT is usually the best in most applications.  There is also another option in the case of scope, you can fetch FFT data from the driver.  The FFT is not actually implemented in hardware, but in the driver, and this is transparent to the user.  It's simpler to use, but not as efficient as the SMT.
    I hop this answers your questions.  Let me know if I can be of further help.
    Regards,
    Kenn North
    Senior Product Manager - Search, Product Data
    http://ni.com/search

  • What is the best way to monitor taffic across a Campus?

    I am trying to find the best way/ways to monitor traffic across a campus network. The two solutions I have thought of are using Netflow or ERSPAN. However, neither are supported by the devices in this network. Here is a quick overview of the network...
    Core Switches (3750 Stacks) using Layer 3
    |
    Distribution Switches (3750 & 3650s) using L3 towards Core and L2 towards Access
    |
    Access Switches (Mostly 3500s) using L2
    What are the best options for monitoring traffic on this type of network? All links between switches are Gig, so we have plenty of bandwidth. I would really like to be able to setup snort/ntop or something similar.
    Are there any solutions available that I could use RSPAN and a monitoring computer at the Access Switches and have them report back to a central monitoring machine? I would prefer a centralized solution.
    Thanks,
    Garrett

    Hello Garrett
    Each monitoring software has its own limitations/specifications..
    If you want to monitor traffic/protocols running on ur network, on a constant basis, you will have to use Netflow.. You can use a simple netflow collector, and collect reports, and analyze the application traffic on your LAN/WAN.. Not sure if this will help too much in troubleshooting, since this will be more used for trending your applications. You can probably discover new applications, which arent used much on your network, using this..
    But for real troubleshooting, you will need something like a syslog server.. u can configure logging levels and push important errors/updates from the cisco gear to this box. In case your box goes down, or has issues, system log messages will be dumped to this server and will be a very useful device for troubleshooting... eg, kiwi cat, solarwinds, 3cdaemon, and lots of other freewares...
    I would ideally have both these components on my network, for trending and troubleshooting..
    apart from this, if you have other advance technology products, like wireless, application accelaration etc, there are other network management solutions available..
    Hope this helps.. All the best.. rate replies if found useful
    Raj

  • What is the best way to set up my new Mac Pro?

    Not wanting to screw up in a process I've not done with a brand new machine before, I'm looking for feedback on my plan for setting my new Mac Pro next week...
    The physical plan is this:
    For RAM, I have four 2GB SDRAM's plus the supplied six 1GB modules. My plan here is to install the 2GB rams into the first four slots and install four of the 1GB modules into the remaining four slots for a total of 12GB's.
    When the cost for 4GB modules gets down to reasonable, I'll buy four of them and bump the current rams down the line which will then give me a total of 24 gigs where I'll stay.
    For my hard drives, I'm installing a 160GB Intel X25-M into the first drive bay
    http://www.intel.com/design/flash/nand/mainstream/index.htm
    using one of MaxUpgrades' 'MaxConnects' kits. I will use this drive for the operating system software and my applications and their libraries.
    Next, into the remaining three drive bays, I am installing three 300GB WD Velociraptors. Mine are the pre-'backplane ready' versions:
    http://www.wdc.com/en/products/products.asp?DriveID=459
    so I have bought these sleds for them...
    http://www.maxupgrades.com/istore/index.cfm?fuseaction=product.display&product_i d=180
    I own one of Sonnet's Tempo SATA E4P cards
    http://www.sonnettech.com/product/temposatae4p.html
    which, thanks to this forum, I now understand, with the correct firmware installed, function well so I will install it and be able to establish hardware RAID. I will create a RAID 0 set with the three Velociraptors and use it to store all of my data files.
    Backup will happen on a 1TB WD 'Caviar Black' external drive connected through one of the Sonnet card's external eSATA ports and using the OS 'Time Machine' software.
    And that's the physical plan. My question is about setting things up. The physical installation part is straight forward and I don't expect any difficulties but I'm wondering what is the best way to install the operating system.
    Do I take a first step keeping the supplied hard drive installed, install the solid state drive into the next drive bay and then transfer the contents from the supplied drive onto the SSD or do I do the complete physical installation process and do a 'C' drive start up and install the OS that way?
    And, do you have any tips/suggestions on setting up the RAID 0 set?
    thanks for the help. I want to do this right.
    JQ

    oh mighty Hatter, I knew you'd have helpful guidance to offer! And thank you. You've confirmed my anxieties about the Sonnet card; kind of a 'too much, too quickly' sort of thing. And it's not that Sonnet's not a good company. Just everything to do with new technologies and the growth curve we all, manufacturers and users, go through when they come out. And, for sure, the new Mac Pro's are new technology; the single biggest forward leap in Apple's top-of-the-line machines for some time far as I can tell. Just reading at Intel's website about the Nehalem's is a joy!
    So, I will proceed now with everything except for the controller card, leaving that 'til later. In the meantime, I think I'll just happily run with the four hard drives all running independently. No software RAID. I know just those, the SSD boot drive plus Velociraptor trio's going inside of a 2.66ghz 8-core Nehalem Mac Pro is going to be a working pleasure. Heck, this way, I'll get settled in and used to the machine's speed, have a great time doing so and then, in however many months, I can jump into spending another chunk of money on an excellent RAID card, RAID card's dear Barefeats will have tested and reviewed for us, set up my RAID 0 set and head of to those new races watching my computer leap for joy! Could be that, by then, the cost of Intel 160GB X25-M's will have dropped enough that I can afford to go for a second and have a two SSD RAID 0 boot drive... Yummy!
    Thanks for the help. Like I say, I knew there was useful guidance hanging on some limb within your personal kit, (otherwise referred to as your mind)!
    Interesting to read about the problems people have had with Sonnet's 2.17 update in PPC's... In this computer, my PowerMac G5 dual 2.7ghz, I have a Sonnet 'Tempo Sata X4P' controller card. I downloaded and installed 2.17 and got the same troubles; no cut, no paste, no 'drag and drop' etc. It was miserable.
    Mine, fortunately, magically corrected after running the 'permissions verify and correct' process in Disc Utility and, after a restart, all was back to almost normal but for one exception; the Sonnet card was no longer present or functioning including the four eSATA ports out the back. (I ran Tech Tools Pro 5's repair suites first but, and who knows why, it didn't correct the problem...) This one was absolutely in the 'who knows what the f_'s going on and why it disappeared but did' class.
    Oh, the other remnant is that, when the computer goes into sleep, after about five minutes, the fans rev up, and up, and the computer's frozen; only access is to do a forced shutdown pressing and holding the power button, so I've had to adopt a 'shut down whenever leaving it for more than fifteen minutes' approach to this dear friend. Once I've fully moved into and established my new one (which should arrive today, by the way... Yippeee!!! Can't wait!), I'll do a complete restoration on this one including taking out the Sonnet card. Usually, I sell my old Pro's but, this time, I'm going to keep this one as a back up and just general second computer for times I might need it. It has been such a great and dependable machine. Keeping it seems the right thing to do.
    thanks Hatter. I'll let you know how things go, including what happens with the SSD. I don't have speed test software so I won't be able to track it's performance like that guy in the post you gave me did...
    JQ
    ps- Gotta love that ILLogic fellow eh? Talk about not getting the essence!

  • What is the best practice in securing deployed source files

    hi guys,
    Just yesterday, I developed a simple image cropper using ajax
    and flash. After compiling the package, I notice the
    package/installer delivers the same exact source files as in
    developed to the installed folder.
    This doesnt concern me much at first, but coming to think of
    it. This question keeps coming out of my head.
    "What is the best practice in securing deployed source
    files?"
    How do we secure application installed source files from
    being tampered. Especially, when it comes to tampering of the
    source files after it's been installed. E.g. modifying spraydata.js
    files for example can be done easily with an editor.

    Hi,
    You could compute a SHA or MD5 hash of your source files on
    first run and save these hashes to EncryptedLocalStore.
    On startup, recompute and verify. (This, of course, fails to
    address when the main app's swf / swc / html itself is
    decompiled)

  • What is the best way to back up my MacBook Pro (OSX 10.9.5) before taking it in for service?

    What is the best way to back up my MacBook Pro (OSX 10.9.5) before taking it in for service?

    While I have nothing against Time Machine (and I do use it on some of my systems), I always make a bootable clone before taking a Mac in for service (2 actually), and I verify that clone boots before I let the Mac leave.
    SuperDuper is free for a full clone (you only pay for incremental features).
    <http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html>
    Carbon Copy Cloner provides a 1 month fully enabled demo mode before you have to buy the product or stop using it.
    <https://www.bombich.com/>

  • What is the best way to protect my macbook pro? should I install mackeeper? Thank you :)

    what is the best way to protect my macbook pro? should I install mackeeper? Thank you

    MacKeeper is malware that charges a fee. Do not install it under any circumstances.
    Keep your software up-to-date with Software Update.
    Don't click on links in emails, retype the URLs to be sure you know where it is sending you.
    Don't download a "codec" or program to view content on a website from the same site -- standard viewers should come from the codec developer's site, not the content site.
    Don't fall for requests from your bank or PayPal to verify your information -- they don't do it that way.
    Download Flash only from:
    http://get.adobe.com/flashplayer/
    You did NOT win any contests you did not enter, and you are not the 10,000th vistitor to any site.

  • What is the best way to share the High Res images ...

    What is the best way to share the High Res images on my Nokia Lumia 1020?  My Android friends really want to see the original ~12MB images taken with Nokia Pro Camera?
    -Paul
    Solved!
    Go to Solution.

    if you have the att device, then use your att locker.
    ANYONE can sign up for the att locker here:
    https://locker.att.net/app/#welcome
    even if you do not have ATT service, you should sign up NOW.
    There is an application that is pre-installed to allow for the 1020 to upload the full resolution files to the AT&T locker.
    AND, because they are launching the 1020, they are giving a free upgrade to the account to the 50GB box instead of the 5GB.
    they are doing this for a limited time only, I have created a couple of accounts.
    after you create your account, it will have to be verified. after you check your email and verify the box, log back in and you will see it is only a 5gb account.
    click on "my Account/upgrade" and choose the 50GB and you should see it say FREE under the cost.
    then you can upload the full res pictures and share them that way.
    otherwise, if you are within reach, try Bluetooth transfer.

  • What are the best approaches for mapping re-start in OWB?

    What are the best approaches for mapping re-start in OWB?
    We are using OWB repository 10.2.0.1.0 and OWB client 10.2.0.1.31. The Oracle version is 10 G (10.2.0.3.0). OWB is installed on Linux.
    We have number of mappings. We built process flows for mappings as well.
    I like to know, what are the best approches to incorportate re-start options in our process. ie a failure of mapping in process flow.
    How do we re-cycle failed rows?
    Are there any builtin features/best approaches in OWB to implement the above?
    Does runtime audit tables help us to build re-start process?
    If not, do we need to maintain our own tables (custom) to maintain such data?
    How did our forum members handled above situations?
    Any idea ?
    Thanks in advance.
    RI

    Hi RI,
    How many mappings (range) do you have in a process flows?Several hundreds (100-300 mappings).
    If we have three mappings (eg m1, m2, m3) in process flow. What will happen if m2 fails?Suppose mappings connected sequentially (m1 -> m2 -> m3). When m2 fails then processflow is suspended (transition to m3 will not be performed). You should obviate cause of error (modify mapping and redeploy, correct data, etc) and then repeat m2 mapping execution from Workflow monitor - open diagram with processflow, select mapping m2 and click button Expedite, choose option Repeat.
    In re-start, will it run m1 again and m2 son on, or will it re-start at row1 of m2?You can specify restart point. "at row1 of m2" - I don't understand what you mean (all mappings run in Set based mode, so in case of error all table updates will rollback,
    but there are several exception - for example multiple target tables in mapping without corelated commit, or error in post-mapping - you must carefully analyze results of error).
    What will happen if m3 fails?Process is suspended and you can restart execution from m3.
    By having without failover and with max.number of errors=0, you achieve re-cycle failed rows to zero (0).This settings guarantee existence only two return result of mapping - SUCCSES or ERROR.
    What is the impact, if we have large volume of data?In my opinion for large volume Set based mode is the prefered processing mode of data processing.
    With this mode you have full range enterprise features of Oracle database - parallel query, parallel DML, nologging, etc.
    Oleg

  • WHAT IS THE BEST ANTIVIRUS SOFTWARE FOR OSX YOSEMITE?

    WHAT IS THE BEST ANTIVIRUS SOFTWARE FOR OSX YOSEMITE?

    Here are some more thoughts to consider.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements.
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it.
    The same goes for a spontaneously appearing dialog insisting that you upgrade your video player right this instant. Such popups are frequently associated with sites that promise to deliver movies or other copyrighted content that is not normally "free".
    The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • What is the best way to reconcile gl account postings with pay results ?

    Hi experts
    what is the best way to reconcile gl account postings with pay results ?
    is it running wage type reporter ?
    or is there any otehr way .. i have variances in wtr n gl posting for a few employees.
    Regards

    Hi,
    Match Payroll Journal (PC00_M40_LJN - Payroll Journal ) with Wage type Report.(PC00_M99_CWTR - Wage Type Reporter )
    Finally verify the Posting amount (PCP0) with Payroll Journal....(PC00_M40_LJN - Payroll Journal )
    This should solve your issue...
    Regards,
    Veeram

  • What's the best way to cleanly stop Goldengate?

    For routine maintenance/upgrades what's the best way to cleanly stop GoldenGate? I don't want to wait endlessly. I use this currently and seen no issues :-
    stop er *!
    kill er *!
    stop manager!
    Thanks,
    Shankar

    shiyer wrote:
    For routine maintenance/upgrades what's the best way to cleanly stop GoldenGate? I don't want to wait endlessly. I use this currently and seen no issues :-
    stop er *!
    kill er *!
    stop manager!
    For routine maintenance/upgrades, just {noformat} "stop er *" {noformat} should be preferred; and when all processes are stopped, mgr can (optionally) be stopped. If you really are waiting endlessly for this to return, the real question is "why": then, perhaps there are other parameters that can be adjusted to make GG stop more quickly. (On the other hand, {noformat} "stop mgr!" {noformat} is harmless, the "!" simply prevents it from asking "are you sure?" before stopping the process.)
    I really wouldn't use "kill" unless you really have a good reason to (and the reason itself requiring the process to be killed should be analyzed & resolved). To "kill" a process shouldn't cause data loss (GG always maintains checkpoints to prevent this) -- but still it seems unnecessary, unless there really is something that should be killed. (Aside: I mean, I can kill -9 / "force quit" my browser and/or 'halt' my laptop every time as well, and it would probably be "faster" to -- but it can cause issues (and wasted time) upon restart: i.e., fsck, recover sessions, whatever. Same basic idea, imo.)
    There's a reason there are different commands to 'stop' processes (stop vs. stop! vs. kill). Just for example, "stop replicat !" causes current transactions to be rolled back; there typically is no reason for this, you'll just restart that txn when the process is restarted; might as well let the current one finish. And "kill extract" (I believe) will not warn about potentially "long running transactions" that can cause (painful) issues at startup (missing old archive logs, etc). There are probably other examples, as well.
    So if this really is "routine", then "stop", don't "stop!" or "kill". If there are long delays, see why first & see if they can be addressed independently. (This really is just a stock answer for a generic question, it would be irresponsible for me to answer otherwise :-) )

Maybe you are looking for

  • Is there a limit to the number of Apple TV's attached to an iTunes Library

    I recently replaced 7 (seven) Version 1 Apple TV's with Version 3 Apple TV's and noticed that I now receive an error, "Cannot connect to the iTunes Library, ensure that you are on the same network, etc." on two of the Apple TV's. Shutting down iTunes

  • We are unable to start your subscription  plz help me ladies and gentlemen PLZ HELP ME!!!

    i just need help because every time i type in my serial number it just says unable to start your subscription plz help me people

  • ABAP in XI

    My customer is interested in using ABAP for XI. As far I know XI supports ABAP for mapping. Are there another objects that can be developed on ABAP?

  • Sourcing/CLM 7 /IE 8: E-Sourcing cannot display this page.

    Good Afternoon, We are experiencing the following issue when logging out of Sourcing/CLM: 1) Log out 2) Try to log back in and recieve the following page: E-Sourcing cannot display this page. Click the browser back button to the previous page. I can

  • Unity Licesnse

    Good afternoon, I am running Cisco Unity server 5.0(1) and have 112 licenses.  I have used 95 which leaves me 17, we are adding about 25 phones and I need to get about 10 license (or whatever bulk amount Cisco sells off) I was given a product number