It looks like my source server (10.0.0.91) isn't sending netflow data to NNA server (10.0.0.44) at port 49152 as I initially requested.
on my source server but it isn't sending correctly I guess. Reason being is that I do not get any prompts after I run this line so I wasn't sure if it successfully went through.
Any other thoughts on why it won't run? Also, not sure why it is using ports 53921 based on the dump...
23:45:47.968044 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [S.], seq 1293421774, ack 1002362237, win 17898, options [mss 8961,sackOK,TS val 98708333 ecr 606098569,nop,wscale 7], length 0
23:45:47.968378 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [.], ack 1, win 141, options [nop,nop,TS val 606098570 ecr 98708333], length 0
23:45:47.968445 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [P.], seq 1:59, ack 1, win 141, options [nop,nop,TS val 606098570 ecr 98708333], length 58
23:45:47.968452 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [.], ack 59, win 140, options [nop,nop,TS val 98708334 ecr 606098570], length 0
23:45:47.968698 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [P.], seq 1:459, ack 59, win 140, options [nop,nop,TS val 98708334 ecr 606098570], length 458
23:45:47.969024 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [.], ack 459, win 149, options [nop,nop,TS val 606098570 ecr 98708334], length 0
23:45:47.969182 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [P.], seq 59:117, ack 459, win 149, options [nop,nop,TS val 606098570 ecr 98708334], length 58
23:45:47.969260 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [P.], seq 459:599, ack 117, win 140, options [nop,nop,TS val 98708335 ecr 606098570], length 140
23:45:47.969607 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [P.], seq 117:264, ack 599, win 157, options [nop,nop,TS val 606098571 ecr 98708335], length 147
23:45:47.969748 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [P.], seq 599:746, ack 264, win 149, options [nop,nop,TS val 98708335 ecr 606098571], length 147
23:45:47.972034 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [F.], seq 264, ack 746, win 166, options [nop,nop,TS val 606098573 ecr 98708335], length 0
23:45:47.972129 IP 10.0.0.91.27016 > 10.0.0.44.53921: Flags [F.], seq 746, ack 265, win 149, options [nop,nop,TS val 98708338 ecr 606098573], length 0
23:45:47.972358 IP 10.0.0.44.53921 > 10.0.0.91.27016: Flags [.], ack 747, win 166, options [nop,nop,TS val 606098574 ecr 98708338], length 0
23:45:47.982375 IP 10.0.0.44 > 10.0.0.91: ICMP echo request, id 8828, seq 0, length 76
23:45:47.982395 IP 10.0.0.91 > 10.0.0.44: ICMP echo reply, id 8828, seq 0, length 76
23:45:47.984241 IP 10.0.0.44 > 10.0.0.91: ICMP echo request, id 8828, seq 1, length 76
23:45:47.984251 IP 10.0.0.91 > 10.0.0.44: ICMP echo reply, id 8828, seq 1, length 76
23:45:47.984855 IP 10.0.0.44 > 10.0.0.91: ICMP echo request, id 8828, seq 2, length 76
23:45:47.984864 IP 10.0.0.91 > 10.0.0.44: ICMP echo reply, id 8828, seq 2, length 76
23:45:47.986855 IP 10.0.0.44 > 10.0.0.91: ICMP echo request, id 8828, seq 3, length 76
23:45:47.986867 IP 10.0.0.91 > 10.0.0.44: ICMP echo reply, id 8828, seq 3, length 76
23:45:47.987271 IP 10.0.0.44 > 10.0.0.91: ICMP echo request, id 8828, seq 4, length 76
23:45:47.987277 IP 10.0.0.91 > 10.0.0.44: ICMP echo reply, id 8828, seq 4, length 76