====== Leverage Application-Fingerprinting to detect iPerf TCP/UDP traffic ======
This TechTip describes how to leverage "Application-Fingerprinting" (AppFP) to detect iPerf traffic (UDP/TCP) in your network and e.g. apply a bandwidth shaping policy.
To detect "iPerf" you first need to create an REGEX (Regular Expression) and apply it.
AOS R7 comes with pre-defined signatures, which are stored in "/flash/app-signature/app-regex.txt".
**Modify or add the following to your file:**
App-name: iperf-udp
Description: iPerf UDP-based transfer
\.?.?\xff\xff\xfc\x18\x36\x37\x38\x39\x30
App-name: iperf-tcp
Description: iPerf TCP-based transfer
\x32\x33\x34\x35\x36\x37\x38\x39\x30\x31
App-group: iperf = iperf-udp iperf-tcp
**Once you saved the file, you need to instruct the OmniSwitch to reload it:**
OmniSwitch-> app-fingerprint reload-signature-file
**Now that you can detect the application (in this case iPerf) you need to define a policy set:**
! QOS:
policy condition c4 appfp-group iperf
policy action a4 maximum bandwidth 10.0M
policy rule r4 condition c4 action a4 no default-list
policy list iperf type appfp
policy list iperf rules r4
qos apply
**In this step you'll tell the OmniSwitch on which port it should apply the Application-Fingerprinting (+ instruct to send an SNMP trap if done):**
! APP-FINGERPRINT:
app-fingerprint trap enable
app-fingerprint port 1/11 policy-list-name iperf
This REGEX is far from being optimal (especially for TCP), it was created for a simple POC.