Send Message
Chengdu Shuwei Communication Technology Co., Ltd.
Chengdu Shuwei Communication Technology Co., Ltd.
products
Home /

products

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection

Product Details

Place of Origin: China

Brand Name: NetTAP®

Certification: CCC, CE, RoHS

Model Number: NT-FTAP-54ECX

Payment & Shipping Terms

Minimum Order Quantity: 1 SET

Price: Can Discuss

Packaging Details: Outer Carton plus Inner Foam

Delivery Time: 1-3 Working Days

Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram

Supply Ability: 100 sets per month

Get Best Price
Contact Now
Specifications
High Light:

network traffic tools

,

netflow traffic analyzer

Network Security:
Such As ISD, WAF, Firewall, Virtual Private Network, Load Balancing Equipment, Etc.
Network Visibility Management:
Such As IDS, DB Audit, Behavior Audit, Operation And Maintenance Audit, Data-oriented Management And Control, Virus Monitoring, WEB Protection, Compliance Analysis And Control
Network Traffic Strategy:
Network Data Deep Analysis, Accurately Present The Proportion Of Each Network Application
Traffic Distribution Based On Strategy:
NPB Loading Balance To The WAF & DBM Devices,NO Need Their Inline Connection
Applications:
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries
Related Solutions:
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize
Network Security:
Such As ISD, WAF, Firewall, Virtual Private Network, Load Balancing Equipment, Etc.
Network Visibility Management:
Such As IDS, DB Audit, Behavior Audit, Operation And Maintenance Audit, Data-oriented Management And Control, Virus Monitoring, WEB Protection, Compliance Analysis And Control
Network Traffic Strategy:
Network Data Deep Analysis, Accurately Present The Proportion Of Each Network Application
Traffic Distribution Based On Strategy:
NPB Loading Balance To The WAF & DBM Devices,NO Need Their Inline Connection
Applications:
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries
Related Solutions:
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize
Description
NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection

NetTAP® IDS / WAF Network Packet Broker and Network TAP to Protect your Network Security by Virus Protection

 

 

1. Product Background

 

With the rapid development of Internet business in recent years, the market competition is becoming increasingly fierce, and the quality of network and service has become a magic weapon to win the market competition.The safety, stability and efficiency of the Internet are directly related to operating income and business quality.On the other hand, with the further reform of Internet platform business, operators, enterprises and institutions are bound to further expand the scope of connectivity, while how to ensure the reliability and security of interconnectivity between networks is an important challenge for operation and maintenance departments and related departments.There are more and more businesses operating on the Internet, and more and more end users, which means more and more traffic carried on the Internet, more and more complex protocols, and more and more serious security threats.Therefore, how to receive a large amount of network data by various network traffic analysis and monitoring devices, effectively and accurately convert the data into valuable analysis, and reduce user network risks and operation and maintenance costs is a major problem currently facing.

 

2. Intelligent Traffic Processing Abilities​

 

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 0UDF Matching

Supported the matching of any key field in the first 128 bytes of a packet. Customized the Offset Value and Key Field Length and Content, and determining the traffic output policy according to the user configuration

 

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 1Network Message Disitribution & Packet Distribution

A message splitting method based on multiple hash is characterized as follows: the method USES two hash algorithms to calculate two hash results respectively, USES one of the hash results to search the result of the spatial primary table as the benchmark index, and USES the other hash result to search the result of the spatial subtable as the auxiliary index to modify the benchmark index.

 

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 2NetTAP® Visibility Platform

Supported NetTAP® Matrix-SDN Visual Control Platform Access

 

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 31+1 Redundant Power System(RPS)

Supported 1+1 Dual Redundant Power System

 

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 4NT-FTAP-54ECX Network TAP NPB.pdf

 

3. Typical Application

Data Center Of Area:

Telecom,

Broadcasting,

Government,

Finance,

Energy,

Power,

Petroleum,

Hospital,

School,

Enterprise

And Other Industries

 

4. NetTAP® Visibility Platform and Network Optimization.

  • Strategic Traffic Protection(as following)

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 5

 

  • Traffic Distribution Based on Strategy

- Network Packer Broker called NPB, Loading Balance to the WAF & DBM devices,NO need their Inline Connection
- Reduce the Cost of Monitoring, improve the Efficiency of Monitoring

 

  • Traffic Distribution Based on Strategy

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection 6

- More application for 25G/50G/100G, bandwidth crazy growing

- Virtualized cloud computing drives both north-south and east-west traffic growth

- Main applications based on B/S architecture, with higher bandwidth requirements, more interaction open, and business changes faster

- Network operation and maintenance: single network management - network performance monitoring, network backtracking, anomaly monitoring - AIOPS

- More security management and control, such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control,

  Virus Monitoring, WEB Protection, Compliance Analysis and Control

- Network Security – from Access control, Threat Detection and Protection to the core of Data Security

 

5. Specifications

System Function Traffic Processing Traffic replication / aggregation / distribution support
Load Balance support
Diverting based on IP / protocol / port Five tuple traffic identification support
UDF Match support
Single Fiber Rx/Tx support
Ethernet encapsulation independence support
Process Abilities 1.8Tbps
Management CONSOLE Network Management support
IP/WEB network management support
SNMP network management support
TELNET/SSH network management support
SYSLOG Protocol support

RADIUS or AAA

Centralized authorization

support
User authentication function Password authentication based on user name

 

*THE MORE ADVANCED FUNCTIONS WILL BE LAUNCHED SOON*

Send your inquiry
Please send us your request and we will reply to you as soon as possible.
Send
Google Analytics -->