icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco AnyConnect Network Visibility Module (NVM) App for Splunk
SHA256 checksum (cisco-anyconnect-network-visibility-module-nvm-app-for-splunk_309.tgz) 81846cb551e56c40f2466219dc3f1e34192a0ac9f0d8b6a611381dd65d481112 SHA256 checksum (cisco-anyconnect-network-visibility-module-nvm-app-for-splunk_218.tgz) 24fef10b515a2ce30ab712a6fd6ca123ab601cb2f505d521a7db9970de4ea324
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Cisco AnyConnect Network Visibility Module (NVM) App for Splunk

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Use and Cisco TAC support of this App and related Add-On require a purchase of Cisco Endpoint Security Analytics (CESA) endpoint license beginning v2.1.4. Please see the Cisco Supplemental End User License (SEULA) below for details. Under the SEULA, free use is permitted for: a) one 90-day trial/proof of value installation; b) on-going use for installations with 50 or fewer Cisco AnyConnect clients.

The Cisco AnyConnect Network Visibility (NVM) App for Splunk allows IT administrators to analyze and correlate user and endpoint behavior in Splunk Enterprise. This app allows for visualization of data and pre-built reports for AnyConnect NVM as part of the Cisco Endpoint Security Analytics for Splunk solution (CESA). The solution provides greater visibility into endpoint behaviors from additional context such as user, device, application, location and destination for flows both on and off premise. It is used in conjunction with the Cisco NVM Technology Add-On for Splunk - https://splunkbase.splunk.com/app/4221/.

For more information visit the Cisco Endpoint Security Analytics (CESA) home page - https://www.cisco.com/go/cesa


For more information about this solution refer to the Cisco Endpoint Security Analytics for Splunk (CESA) home page.


Cisco AnyConnect Network Visibility Module (NVM) App for Splunk consists of 3 components:

  • The Splunk App - 2992 with pre-designed Dashboards to visualize and view the data.
  • The Splunk Add-on - 4221 which provides data indexing and formatting inside Splunk Enterprise.
  • The NVM Collector Component which is responsible for collecting and translating all IPFIX (nvzFlow) data from the endpoints and forwarding it to the Splunk Add-on. This is a manually installed component that requires 64-bit Linux (see NVM COLLECTOR COMPONENT INSTALLATION section for more information).


Below is a high level overview of a deployment in its simplest form.
This would be an all-in-one configuration running on 64-bit Linux.
This configuration is how most demonstrations will be setup and is also useful in a small production deployment.

Below is a more comprehensive set of options that are available for deployment.
Typically a production setup will be distributed and have several Splunk Enterprise nodes.


The Application should be installed on the Search Head or Indexer, either through the UI via “Manage Apps” or by extracting the archive into /opt/splunk/etc/apps folder.

The Splunk Add-on should be installed following the Splunk Best Practices Instructions for Add-ons

Please restart the Spunk Server after installation of both components is completed.
You can confirm that both components are properly installed by viewing them in "Manage Apps"

After completing this step, refer to the NVM collector installation section below. The collector must be running before data will be available to the Splunk components.

The default configuration receives three data feeds for Splunk, Per Flow Data, Endpoint System Data and Endpoint Interface Data, on UDP ports 20519, 20520 and 20521 respectively. This can be changed in the Application Input settings in Splunk if for some reason you needed to change the collector configuration as described below.
The Add-On maps these to Splunk sourcetypes cisco:nvm:flowdata, cisco:nvm:sysdata and cisco:nvm:ifdata.

NOTE: Because sourcetypes have changed older data generated from version 1.x will not map to the UI dashboards.


The NVM collector runs on 64-bit Linux. CentOS, Ubuntu and Docker configuration scripts are included. The CentOS install scripts and configuration files can also be used in Fedora and Redhat distributions.

In a typical distrubuted Splunk Enterprise deployment, the collector should be run on either a standalone 64-bit Linux system or a Splunk Forwarder node running on 64-bit Linux.

NOTE: The solution can also be run on a single 64-bit Linux system that includes the NVM collector and Splunk Enterprise components for use in a small deployment or for demonstration purposes.

In order to install the collector you will need to copy the application in the acnvmcollector.zip file, located in the [YOUR_SPLUNK_SERVER]/$APP_DIR$/appserver/addon/ directory to the system you plan to install it on.

Extract the files on the system where you plan to install the collector on and execute the install.sh script with super user privileges. It is recommended to read the $PLATFORM$_README file in the .zip bundle before executing the install.sh script. The $PLATFORM$_README file provides information on the relevant configuration settings that need to be verified and modified (if necessary) before the install.sh script is executed. At a minimum, you will need to configure the address of the Splunk instance you will be forwarding data to. Failing to properly configure the system can cause the collector to operate incorrectly.

NOTE: Ensure that network and host firewalls are properly configured to allow the UDP traffic for the source and destination addresses and ports

A single NVM collector instance can handle a minimum of 5000 flows per second on a properly sized system.

The collector needs to be configured and running before the Splunk App can be used.
By default, the collector receives flows from AnyConnect NVM endpoints on UDP port 2055.
Additionally, the collector produces three data feeds for Splunk, Per Flow Data, Endpoint System Data and Endpoint Interface Data, on UDP ports 20519, 20520 and 20521 respectively.

The receive and data feed ports can be changed by altering the acnvm.conf file and restarting the collector instance. Make sure that any host/network firewalls between endpoints and the collector or between the collector and Splunk system(s) are open for the configured UDP ports and addresses. Also ensure that your AnyConnect NVM configuration matches your collector configuration. Refer to the AnyConnect Administration Guide for more information.

Once all components are installed and running, refer to the Help files section from within the Splunk application for detailed information about the pre-configured reports, data model and information elements that are created by the solution.

You may want to restart one of your AnyConnect endpoints and validate that data is being sent to the solution.

Some additional information is available at this Cisco Community Site that you might find useful.


Recommended hardware requirements for a standalone NVM Collector instance running on 64-bit Linux:

  • Upto 1000 endpoints / server instance:

    • CPU cores: 6 cores / 2.2 GHz (x86 64-bit)
    • RAM size: 8 GB
    • Disk sub-system: Any
    • Total Disk Capacity: 50 GB
  • 1000-5000 endpoints / server instance:

    • CPU cores: 8 cores / 2.4 GHz (x86 64-bit)
    • RAM size: 16 GB
    • Disk sub-system: Any
    • Total Disk Capacity: 50 GB
  • 7500-10,000 endpoints / server instance:

    • CPU cores: 12 cores / 2.6 GHz (x86 64-bit)
    • RAM size: 24 GB
    • Disk sub-system: Any
    • Total Disk Capacity: 50 GB


Splunk Developers who are interested in learning more about the AnyConnect NVM protocol and overall solution can go to the Cisco DevNet site for more information.


This app is written and maintained by Cisco (nvzFlow at cisco dot com). Be sure to read the above sections for initial assistance with setup and configuration. See Supplemental End User License as well as the Cisco Endpoint Security Analytics for Splunk home page for more information.

Release Notes

Version 3.0.9
Sept. 2, 2020

Cisco NVM App for Splunk 8.0

*Modified directory structure to conform to cloud vetting requirements

Version 2.1.8
May 27, 2020

Version 2.1.8
*Modified the app setup page to include config options for the crons in savedsearches.conf
*Defaulted crons to 5 min refresh rates
*Changed Process Listing metric to show log vs linear scale, making it easier to identify less common anomalies
*Added monitoring frequency filter to the Security Evasion metric

If you are having Docker related issues - email nvzFlow@cisco.com for instructions on how to address it. An update will be posted soon.

2.x supports a new look and feel in addition to several new reports with a focus on Split Tunneling (remote workers) and Split Networking (office workers using insecure wifi and secure wifi at the same time) monitoring. The new dashboards are organized into several use cases identified below. It's important to note that many of the dashboards help identify potential threats and aid in the investigative process, however that does not necessarily indicate an attack or compromise occurred.


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.