What is Application Visibility and Control (AVC)

What is Application Visibility and Control (AVC)

Application Visibility and Control (AVC) is a technology that involves multiple components, including Network Based Application Recognition Version 2 (NBAR2), Flexible NetFlow (FNF), and management tools that provide powerful application visibility and control capabilities based on stateful deep packet inspection (DPI).

With the Cisco AVC solution available on wireless controllers from AireOS 7.4 onward, it is possible to identify applications inside the packet and to have a measure of control over them. Types of control include the following: Marking of DSCP Rate-limiting/policing traffic in the upstream or downstream direction Dropping certain traffic types Using the AVC engine on the controller, it is possible to identify over a thousand applications.

No alt text provided for this image


The number of applications that can be identified is constantly being updated as new signatures become available, and these can be added or updated to the controller independently of an operating system upgrade. Importantly, unlike the WLAN QoS configuration that was discussed previously, AVC has the ability to mark the original DSCP value. The above images illustrates the functionality of AVC in Cisco wireless controllers.

With DSCP remarking capabilities, better QoS handling in the downstream direction can be achieved. Since AVC operates on the controller in centralized mode, the effect on wireless QoS is only in the downstream direction. Note that in FlexConnect mode, AVC operates in the AP, whereas in centralized mode it operates only on the controller. This also means that for upstream traffic, the effect of AVC for controlling traffic is only toward the wired network from the controller (meaning from the AP to the controller over the CAPWAP tunnel, AVC will have no effect in the upstream direction until it reaches the controller).?

要查看或添加评论,请登录

Mark P.的更多文章

  • Layer 2 Security : 802.1x Explained Briefly

    Layer 2 Security : 802.1x Explained Briefly

    Imagine an exclusive club with a bouncer. 802.

  • Scan To Folder : Is it safe?

    Scan To Folder : Is it safe?

    Scan to folder is a feature commonly found on multifunction devices (MFDs) and printers that allows you to directly…

  • Cyber Essentials A Brief Explanation

    Cyber Essentials A Brief Explanation

    Cyber Essentials is a government-backed cybersecurity framework developed in the UK by the National Cyber Security…

  • Cyber Attack History : Marriott International

    Cyber Attack History : Marriott International

    The cyber attack on Marriott International in November 2018 was a major data breach that exposed the personal…

  • Types Of Wireless Antenna's

    Types Of Wireless Antenna's

    Wi-Fi antennas play a crucial role in wireless communication by transmitting and receiving radio frequency signals…

  • CAPWAP Explained (Briefly)

    CAPWAP Explained (Briefly)

    If you are studying for a wireless certification such as CCNP ENWLSD 300-425 you may find the below useful. Control and…

  • Microsoft Windows Registry Hives.

    Microsoft Windows Registry Hives.

    The Windows Registry is a hierarchical database used by the Microsoft Windows operating system to store configuration…

  • A Brief RAID Explanation

    A Brief RAID Explanation

    RAID (Redundant Array of Independent Disks) is a technology that combines multiple physical hard drives into a single…

    1 条评论
  • CCNA : ACL ( Video )

    CCNA : ACL ( Video )

    This brief tutorial/explanation of how ACL (Access Control Lists) work on a router or switch. Below in an analogy to…

    1 条评论
  • CCNA : HSRP

    CCNA : HSRP

    HSRP (Hot Standby Router Protocol), is a networking protocol used to provide high availability and redundancy for…

社区洞察

其他会员也浏览了