Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
|
|
|
- Jerome Jackson
- 9 years ago
- Views:
Transcription
1 Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
2 Agenda Goal: Present an overview of Tap technology and how it makes network monitoring and security devices more effective and efficient. Schedule: Section 1 Section 2 Section 3 Section 4 Section 5 Tap Technology Overview Taps, Port Aggregators, and Regeneration Taps Active Response and Bypass Switches Link Aggregators and Matrix Switches Taps with Intelligence 2 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
3 Session 1 Tap Technology Overview 3 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
4 Passive Monitoring Access Access means having visibility to packets. 100% visibility includes packet fragments and Layer 1 and 2 errors. Passive means without affecting traffic. No latency No IP Address No packets added, dropped, or manipulated No link failure Traffic can be collected from wired networks in the following ways: Hubs SPAN ports In-line Devices Taps 4 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
5 What is Zero Delay? Zero Delay eliminates delays caused by the 10 msec delay found in most taps when the Tap loses power. This short delay can cascade into longer delays while devices renegotiate the link. Zero Delay means if the Tap loses power, No packets are dropped or resent No latency is introduced Power loss to the Tap in undetectable in the network Net Optics Products with Zero Delay 10/100BaseT Taps 10/100BaseT Regeneration Taps 5 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
6 Hubs Hubs are networking devices that repeat a packet on every interface except the interface that transmitted the packet. All hosts connected to the hub see each other s traffic. Advantages: Very inexpensive Easily available Disadvantages: Point of failure Half-duplex only No retransmission of collisions Impractical in a switched network 6 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
7 Placing Devices In-line A very simple method of deploying security and monitoring devices is to place them in-line on the link. Advantages: See all traffic including Layer 1 and 2 errors Preserve full-duplex links No access device or additional cables required Disadvantages: Introduces a point of failure Relocating the device means link downtime Device gets locked in one location, limiting device usefulness 7 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
8 SPAN Ports Switched Port Analyzer (SPAN) Ports, also referred to as port mirroring and port monitoring, present combined traffic from multiple switch ports. Advantages: Easy access to network traffic because a single NIC on the sensor can connect to a single SPAN port on the switch SPAN ports can combine traffic from a variety of switch ports Disadvantages: Switch configuration requires time and resources and can introduce errors resulting in missed traffic Under heavy loads, SPAN ports may not see all traffic SPAN ports only supply traffic passing through a single switch. Seeing traffic on other devices requires a different approach Filters out Layer 1 and 2 errors 8 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
9 Test Access Ports (TAP) Taps are designed to duplicate traffic for monitoring devices. They create permanent access points for passive monitoring of traffic between any two network devices. Advantages: See all traffic including Layer 1 and Layer 2 errors Preserve full-duplex links Device neutral - can be installed between any 2 devices Remain passive Do not introduce a point of failure Increases connectivity options for monitoring devices Disadvantage: Requires initial monetary investment 9 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
10 What is a Tap? A Network Tap creates a permanent access port for passively monitoring all traffic on a link without data stream interference or introducing a potential point of failure. Network Taps use passive splitting or regeneration technology to transmit in-line traffic to an attached management or security device. 10 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
11 Basic Tap Types There are a variety of Taps available for nearly every network type, from 10Mbps to 10Gbps, fiber and copper. Aside from network type and connectivity there are the following basic types of Taps and similar devices: Single Tap - Duplicates link traffic for a monitoring device Regeneration Tap - Duplicates link traffic for multiple monitoring devices Link Aggregator Tap - Combines traffic from multiple links Matrix Switches - Offers software-control access to multiple links Other Tap options include: Built-in Media Conversion - Use mismatched interfaces without separate media converter Active Response - Inject responses back into the link 11 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
12 Session 2 Taps Port Aggregators Regeneration Taps 12 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
13 Copper Tap Interfaces Secure, passive network access for copper monitoring devices on copper networks. Copper Interfaces: 10/100BaseT 10/100/1000BaseT 1000BaseT 13 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
14 Fiber Tap Interfaces Secure, passive network access for fiber monitoring devices on fiber networks. Fiber Interfaces: Gigabit 10 Gigabit SX Mutlimode SR Multimode LX Singlemode LR Singlemode ZX Singlemode ER Singlemode 14 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
15 Fiber Tap Split Ratios What is a Split Ratio? A split ratio is the amount of light that is re-directed from the network to the monitor ports. What is a Loss (power) Budget and how do I calculate it? A Loss (power) Budget is the amount of attenuation that can be tolerated on the network and monitor links before the endto-end data is corrupted. To calculate this, you must know the following: Link Distance, Fiber Type, Launch Power, Receiver Sensitivity, number of interconnects and splices. 15 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
16 Fiber Tap Split Ratios 16 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
17 Converter Taps Converter Taps offer all the advantages of a regular tap with the addition of a built-in media converter. Easily connect monitoring devices to dissimilar networks. Data Flow in a Converter Tap 17 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
18 Port Aggregator Taps Typically, full-duplex monitoring with a network tap requires two NICs (or a dual channel NIC) one interface for each side of the tapped full-duplex connection. A port aggregator Tap combines these streams, sending all aggregated data out a passive monitoring port. Data Flow in a Aggregation Tap 18 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
19 Port Aggregator Taps 19 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
20 In-line Regeneration Taps Allows passive access to a single link with multiple monitoring devices. Data Flow in an In-line Regeneration Tap 20 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
21 Regeneration Taps 21 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
22 Span Regeneration Tap Allows access to two separate Network Switch Span Port sessions with multiple monitoring devices. Data Flow in an Span Regeneration Tap 22 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
23 Span Regeneration Tap 23 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
24 Section 2 Summary Simple Taps Inexpensive passive monitoring with 100% visibility Aggregation Taps Full-duplex monitoring to a single NIC One or two Monitor Ports Regeneration Taps Solve access contention with multiple Monitor Ports Features to look for: Full-duplex monitoring for all fiber and copper interfaces Dual power supplies Zero Delay Link Fault Detection 24 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
25 Section 3 Active Response & Bypass Switches 25 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
26 Active Response Taps Passive network access with the option to inject responses, such as a TCP reset, into the network. Gives you the option to set one port to support bi-directional traffic. Active Response Taps reduce the number of network ports (NICs) required for active response functionality. Data Flow in an Active Response Regeneration Tap 26 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
27 Active Response Taps 27 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
28 Bypass Switches Bypass Switches are specialized Taps that provide fail-safe link protection when you connect in-line devices such as Intrusion Prevention Systems (IPS) to your network. Bypass Switches enable appliances to be inserted or removed without downtime, eliminating risks from hardware failure. Bypass Enabled Disabled 28 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
29 Bypass Switches Bypass Disabled 29 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
30 Bypass Switches Bypass Enabled 30 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
31 Section 3 Summary Active Response Available in 10/100 Taps & Regeneration Taps Ability to inject data into the network for TCP Resets Creates a 2-way monitoring port Power-loss Bypass Switch Shares the same power source as the in-line device Preserves link when power to the in-line device is off Bypass Switch with Heartbeat Sends a heartbeat packet through the in-line device Preserves the link when the in-line device fails Protects against power, link, and application failure 31 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
32 Section 4 Link Aggregators And Matrix Switches Leveraging Assets 32 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
33 Leveraging Assets Network Professionals are faced with increasing challenges: Network complexity creates the potential to miss critical data Too few access point to use network equipment and monitoring tools efficiently Limited budgets drive innovation for greater efficiency of existing equipment For a Defensible Network you need to: Monitor 24/7 Use tools simultaneously Be proactive Access all links What can you do to maximize the usefulness of the tools you already have? 33 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
34 In-line Link Aggregator Taps Provide permanent access when you need to monitor multiple 10/100 links with one GigaBit device. Four 10/100 network ports to GigaBit monitor port will not drop packets even when network ports are at maximum bandwidth. Data Flow in an In-Line Link Aggregator Tap 34 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
35 Span Link Aggregator Taps Span Link Aggregator Taps extend the reach of GigaBit monitoring devices to traffic from multiple Span ports. Aggregating Span traffic from multiple switch Span port greatly increases the Span traffic covered by your monitoring device. Data Flow in an Span Link Aggregator Tap 35 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
36 Case Study 1 Goal: Convert fiber to copper, aggregate links and regenerate aggregated traffic for multiple monitoring devices. 36 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
37 In-Line Matrix Switches The physical layer connections through a matrix switch eliminates the need to reconnect and reconfigure analyzers for each new monitoring task. This flexibility improves ease of use and return on investment. Data Flow in an In-Line Matrix Switch 37 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
38 Matrix Switches Enhance LAN visibility by providing access across multiple network links for one or two distributed analyzers. 38 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
39 Span Matrix Switches The Span matrix switches support simultaneous passive monitoring of Span ports connected to the matrix switch, each with a separate distributed analyzer. Monitored Span ports can be selected statically, for automatic roaming, or for a custom monitoring pattern. Data Flow in a Span Matrix Switch 39 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
40 Span Matrix Switches Enhance visibility by providing access to multiple network switch span ports for one or two distributed analyzers. 40 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
41 Case Study 2 Goal: Gain visibility to critical network links for a protocol analyzer using existing regeneration taps. 41 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
42 Section 4 Summary Link Aggregator Aggregate up to (8) Span sessions to 1 GigaBit NIC Aggregate up to (4) 10/100 full-duplex links to 1 GigaBit NIC Available in Single/Dual monitor ports Monitor ports can be copper/fiber or a combo of 1 each Matrix Switch In-Line Matrix Switches use Tap technology to provide complete cross-link visibility without data stream interference Span Port Matrix Switches Serve as end-station monitoring, do not split the signal, and can be daisy chained for doubled or tripled coverage Management software provides control over which links are monitored, including the ability to program and save custom monitoring patterns Expand coverage of your monitoring device Add scalability to your monitoring solution 42 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
43 Section 5 Taps with Intelligence and Remote Access 43 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
44 Intelligence Defined Information - Gives a look into network health. Displays link utilization rates and peaks without having to install more expensive network analysis devices Security and Control - the ability to control the Tap is built-in. Turn on/off the management and monitoring ports Turn on/off the front panel display Remote Access and Management Access a Tap with a Web browser and SNMP tools 44 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
45 Intelligent Tap Management Information Real time utilization levels for each side of link traffic Size and time of the greatest traffic peaks SNMP traps for system, link, power, and threshold Counters for total packets, bytes, CRC errors, collisions, and more Status for system, link, and power Security and Control Turn off Management and Monitor Ports Set utilization alarm thresholds Reset statistics counters and peak data Turn off LCD information 45 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
46 Intelligent Tap Summary Creates the pervasive network awareness required to build a defensible network Baseline information from the Tap allows network managers to deploy security and monitoring devices more effectively over more links Scalable system provides more flexibility in network infrastructure for no additional cost! Efficient management of multiple Intelligent Taps from a single location 46 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
47 Additional Information For more information please visit Joy Weber Senior Technical Specialist The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc.
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
BIG-IP ASM plus ibypass Switch
White Pap er ibypass Switch maximizes application uptime. by F5 Networks and Net Optics Contents Introduction 3 How it works 4 Bypass Off 4 Bypass On 4 Heartbeat TM Packet 5 ibypass TM Switch 6 Media conversion
Efficient Network Monitoring Access
Abstract Organizations that rely on the reliability, security, and performance of their networks can no longer afford to wait for outages or security breaches to occur before installing test access points.
Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET
Ixia Director TM Powerful, All-in-One Smart Filtering with Ultra-High Port Density The Ixia Director TM is a smart filtering appliance that directs traffic of interest to your monitoring tools. Now you
How To Use A Network Instrument Ntap
ntap Product Family Provides monitoring and security devices with complete visibility into full-duplex networks Network Instruments ntaps let you monitor and analyze full-duplex links. ntaps are critical
Net Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
Installation Guide for GigaBit Fiber Port Aggregator Tap with SFP Monitor Ports
Installation Guide for GigaBit Fiber Port Aggregator Tap with SFP Monitor Ports (800-0037) Doc. PUBTPASXSFPU Rev., 07/08 Contents Introduction.... Key Features... Unpacking and Inspection....3 Product
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
Ixia Net Optics 10G Regen Tap
Ixia Net Optics 10G Regen Tap Ixia Net Optics 10G Regen Taps solve the key physical layer challenges of multi-device monitoring for 10 Gigabit and gigabit networks. For a complete picture of network health,
Table of Contents. Network Critical NA LLC Tel: 716-558-7280 37 Franklin Street, Suite 100 Email: [email protected]
Product Catalog Table of Contents Breakout TAPs...1-3 Fixed Aggregating Portable TAP...4-5 V-Line TM (Bypass) Portable TAPS...6 Breakout Portable TAP...7 V-Line (Bypass) TAPs...8-9 Smart Network Access
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
domain is known as the high side, and the less secure domain is the low side. Depending on the application, the
Data diodes refer to unidirectional network links used in some high-security network architectures. This paper explains how data diodes are used to secure information and protect against intrusions; it
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
How To Monitor A Network With A Network Probe
Network Monitoring and Analysis Techniques Using Taps and SPAN Switches Networks have evolved into complex structures supporting critical business processes and communications. As this complexity has increased,
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
Taps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks
WHITE PAPER Taps vs. SPAN The Forest AND the Trees: Full Visibility into Today's Networks www.ixiacom.com 915-3534-01 Rev. A, September 2015 2 Table of Contents The First Line of Defense: Access... 5 Problem
WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
Installation Guide for. 10/100BaseT Port Aggregator Tap with Active Response. Models PA-CU-AR, PAD-CU-AR. Doc. PUBPACUARU Rev.
Installation Guide for /0BaseT Port Aggregator Tap with Active Response Models PA-CU-AR, PAD-CU-AR Doc. PUBPACUARU Rev. 1, 06/06 /0 Port Aggregator Tap Contents Introduction.....................................................
tap into your network
tap into your network product brochure ELEXO 20 Rue de Billancourt 92100 Boulogne-Billancourt Téléphone : 33 (0) 1 41 22 10 00 Télécopie : 33 (0) 1 41 22 10 01 Courriel : [email protected] TVA : FR00722063534
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Installation Guide for. 10/100 to Triple-speed Port Aggregator. Model TPA-CU. 800-0045-001 Doc. PUBTPACUU Rev. 1, 12/08. In-Line
Installation Guide for 10/100 to Triple-speed Port Aggregator Model TPA-CU In-Line 800-0045-001 Doc. PUBTPACUU Rev. 1, 12/08 Contents Introduction.....................................................
WHITE PAPER. Tap Technology Enables Healthcare s Digital Future
WHITE PAPER Tap Technology Enables Healthcare s Digital Future www.ixiacom.com 915-6912-01 Rev. A, July 2014 2 Table of Contents Executive Overview... 4 Introduction... 4 HIT s foundation... 5 Keeping
Installation Guide for GigaBit Fiber Port Aggregator Tap with SFP Monitor Ports
Installation Guide for Gigait Fiber Port ggregator Tap with SFP Monitor Ports Doc. PUPDSXSFPU Rev., 08/06 Gigait Fiber Port ggregator Tap Contents Introduction.....................................................
Installation Guide for Gig Zero Delay Tap and 10/100/1000BaseT Tap
Installation Guide for Gig Zero Delay Tap and 10/100/1000BaseT Tap 800-0150-001 Rev. F PUBTPCU3ZDU 8/10 Gig Zero Delay Tap PLEASE READ THESE LEGAL NOTICES CAREFULLY. By using a Net Optics Tap you agree
Enhanced Visibility, Improved ROI
Abstract Enhanced Visibility, Improved ROI The IT Security/Network Infrastructure Management departments within an organization have access to some of the richest and most useful enterprise data. Because
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
Any-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
GigaVUE-420. The Next Generation. Data Access Switch. Gigamon Systems. Intelligent Data Access Networking
GigaVUE-420 The Next Generation Data Access Switch Gigamon Systems Intelligent Data Access Networking GigaVUE is a Data Socket Part of the Reliable Network Infrastructure Plug-in multiple out-of-band tools
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable StarTech ID: IES101002SFP The IES101002SFP 10-port Ethernet switch delivers flexibility and control of your network by
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
White Paper: Deploying Network Taps with Intrusion Detection Systems
Executive Summary Network Security is a large and growing area of concern for corporations. CERT Coordination Center records show 294,037 incidents reported between 2000 and 2003, with 137,529 incidents
Leased Line + Remote Dial-in connectivity
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
How To Increase Network Performance With Segmentation
White Paper Intel Adapters Network Management Network Performance Using Segmentation to Increase Network Performance More network users, greater application complexity, larger file sizes all of these can
Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET
Ixia xstream TM 10 Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks The Ixia xstream 10 is a network packet broker for monitoring high-speed network traffic, letting you share the network
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance
NetTESTER Embedded 'Always-On' Testing & In-Service Performance Assurance Ethernet WAN Service: Typical Scenario HQ & Operations Centre (NOC) Management Access Management Access Site A Ethernet (Layer-2)
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Network Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products
Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products Table of Contents Introduction...................................................................... 1 About Link
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Best Practices in Gigabit Capture
Network Instruments White Paper Best Practices in Gigabit Capture How to obtain accurate, line-rate captures with your gigabit investment Analysis is a necessary component of network management. Understanding
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
G-TAP A Series // Data Sheet
Product The GigaTAP A Series is a line of network TAPs designed with the Gigamon Always On architecture. This one-of-a-kind architecture eliminates network link downtime on network connections through
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Using High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Network Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
Secure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
SPAN Port or TAP? TAP is the only viable data access technology for today s business critical networks
TAP is the only viable data access technology for today s business critical networks Is SPAN port a viable data access technology for today s business critical networks, especially with today s ever increasing
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing
Net Optics xbalancer and McAfee Network Security Platform Integration
Under the McAfee SIA Partner Program, Net Optics is integrating its xbalancer with the McAfee Network Security Platform (NSP). This partnership will enable mutual customers to realize the benefits of load
Product Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
IntraCore 35160 Series 16-port Gigabit Managed Switches Layer 2
A Communication Division of UIC Corporation IntraCore 35160 Series 16-port Gigabit Managed Switches Layer 2 IC35160T IC35160G The IntraCore 35160 Series is Asanté s most powerful, flexible family of Layer
IPv6 Broadband Access Network Systems
IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems 60 Junji Yamada Koji Wakayama Eisuke Sato OVERVIEW: To meet the demand for broadband access and enable a smooth transition from
Contract Number NNG07DA20B NASA SEWP IV
185-800604 DDS5500-1000EC DDS5500-1000EC DDoS Defense System, bundled with 1-unit license for "Network Security Analyzer" reporting and event management software for Windows. CD-ROM included. Built-in
Interceptor Optical Network Security System. Design Guide. Chapter 4: INTERCEPTOR Optical Network Security System Alarmed Carrier PDS
Interceptor Optical Network Security System } Chapter 4: INTERCEPTOR Optical Network Security System Alarmed Carrier PDS Copyright 2010 Network Integrity Systems, Inc. All rights reserved. The information
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Deploying Probes and Analyzers in an Enterprise Environment
Network Instruments White Paper Deploying Probes and Analyzers in an Enterprise Environment As an IT manager, you need visibility into every corner of the network, from the edge to the core. A distributed
White Paper. Intrusion Detection Deploying the Shomiti Century Tap
White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an
CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP
Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP Gain Access and Visibility to your 10 Gigabit Links Today! 10 Gigabit SR or LR Passive Optical TAP or connect two (2) 10 Gigabit
Computer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
Enhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
EtherDevice Switch EDS-726 Series
Managed Redundant EtherDevice TM Switch Solutions EtherDevice Switch EDS-726 Series 26-Port Gigabit Ethernet Switch Modular, Managed, Redundant Features Industrial Networking Capability Redundant Gigabit
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Your single source for network transmission solutions.
Transmission Network Solutions Safety Security Certainty Your single source for network transmission solutions. Robust performance and complete flexibility to meet all your current and future transmission
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks
Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks By Galen Udell Belden CDT Networking 2006 Category 6 vs Category 5e Cabling Systems and Implications
Ethernet Link SGI-2424
Ethernet Link SGI-2424 24 Combo Ports (10/100/1000Mbps Copper and Dual-Speed SFP) + 2G TP/SFP Combo Layer 2+ Managed Gigabit Ethernet Switch Overview LinkPro SGI-2424 is a layer-2+ gigabit access switch
FSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1.
FSW-0505TX FSW-0805TX 5/8 Port SOHO 10/100Mbps NWay Switch User s Manual (Revision 1.0) FCC Class A Appliance This equipment generates and uses radio frequency energy. If it is not installed and used
Ten top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC End-to-end Infrastructure Protection for Institutions In the last few years, the demand for classified information experienced by many government
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
