Send Message
Chengdu Shuwei Communication Technology Co., Ltd.
Chengdu Shuwei Communication Technology Co., Ltd.
products
Home /

products

Network Packet Analysis Tools IT Operation And Maintain Tools In Network Packer Brokers

Product Details

Place of Origin: China

Brand Name: NetTAP®

Certification: CCC, CE, RoHS

Model Number: MATRIX-TCA-CG

Payment & Shipping Terms

Minimum Order Quantity: 1 SET

Price: Can Discuss

Packaging Details: Outer Carton plus Inner Foam

Delivery Time: 1-3 Working Days

Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram

Supply Ability: 100 sets per month

Get Best Price
Contact Now
Specifications
High Light:

network traffic analysis tools

,

network packet analysis tools

Deployment:
Data Center Core Network, Edge, Backbone
Visibility Tools:
Data For Load Balance, Time Stamp, Deduplication, Slicing, Stripping, Etc
NPBs Deployment:
Out-of-band And Inline
Reliability:
PEM Module Power, Good Heat Dissipation Channel
Applications:
Data Center Of Telecom, Broadcasting, Government, Etc
Header Stripping:
MPLS, GRE, VxLAN
Deployment:
Data Center Core Network, Edge, Backbone
Visibility Tools:
Data For Load Balance, Time Stamp, Deduplication, Slicing, Stripping, Etc
NPBs Deployment:
Out-of-band And Inline
Reliability:
PEM Module Power, Good Heat Dissipation Channel
Applications:
Data Center Of Telecom, Broadcasting, Government, Etc
Header Stripping:
MPLS, GRE, VxLAN
Description
Network Packet Analysis Tools IT Operation And Maintain Tools In Network Packer Brokers

Network Visibility Fabrics IT Opertation and Maintain Tools in Network Packer Brokers

 

 

Network Visibility Fabrics IT Opertation and Maintain Tools

These packet manipulation are often essential for the proper functioning of network operations tools, out-of-band security tools, and inline security systems.

NPBs Network Operation Tools for Out-of-band and Inline Network Monitoring 

- Decryption for out-of-band tools

- Load balancing on outer layer 2-4 across multiple analyzers/monitors

- Time stampin

- Load balancing on inner/encapsulated layer 2-4

-  Across multiple analyzers/monitors

- Outbound layer 2-4 and layer 7 filtering, Inbound layer 2-4 filterin

- Packet slicing

- Data generation, traffic  generation

- Intelligent data deduplication, Basic packet deduplication (layer 2/3) 

- Tunneling protocol

- Advanced header stripping (MPLS, GRE, VxLAN)

- Header stripping (de-encapsulation)

- Data Masking

- Link aggregation without VLAN tagging

 

Machine Specification

 

Items Specifications
Chassis size NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
Adapter chassis and power Power supply
NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-7U7S-AC:220V AC
NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-16U14S-AC:220V AC
Power:
NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W
NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W
NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W
NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W
Environment requirement Working temperature:0℃~50℃
Storage temperature:-20℃~80℃
Working humidity:5%~95%,Non-condensation
Standard Certification Advanced®specification PICMG® 3.0 R2.0
RoHs,Designed for CE,FCC,NEBS Level 3
 

Network Packet Broker Specification and Module Type

 

Component type Product Model Basic Parameter Remarks
Chassis NTCA-CHS-7U7S-DC Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular Must choose one
NTCA-CHS-7U7S-AC Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular
Service card NT-TCA-SCG10 100G exchange card,10*QSFP28 interface Choose according to actual business needs
NT-TCA-CG10 100G service card,10*QSFP28 interface
NT-TCA-XG24 10G service card,24*SFP+ interface
NT-TCA-RTM-CG10 100G RTM card,10*QSFP28 interface
NT-TCA-RTM-EXG24 10G RTM card,24*SFP+ interface
   
TCA Visibility Embedded software system NT-TCA-SOFT-PKG   must

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

What's the Matrix Modular Designed Plug-in Network Packet Broker to do?


With the acceleration of carrier broadband construction and the rapid development of 3G, 4G, and 5G networks, and with the popularity and development of big data and cloud computing technologies, data traffic is growing, and the bandwidth requirements for backbone networks and core networks are increasing. Since 2013, the major operators have begun to gradually upgrade the backbone network. The core backbone network transmission link media starts to be expanded from 10GPOS and 40GPOS links to 100G Ethernet links. It will inevitably lead to the continuous updating of big data collection and analysis technology. In the face of 100GE link environment with high bandwidth capacity, how to effectively meet the requirements of various national security, network security monitoring, operator intelligent pipeline DPI data collection and analysis will become a hot spot in the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction of the Internet and develop the MATRIX-TCA-CG Traffic Acquisition(Traffic Capture) Visibility System, and dedicated to the traffic collection and visual analysis application requirements on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG integrates free-steering output functions such as network flow collection/acquisition, aggregation, filtering, forwarding/distribution, and load balancing and provides an efficient solution for the flow analysis.
 
Matrix-TCA-CG is a network data visualization control device for high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE 40GE and 100GE links distributed intensively in operators mobile Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high carrier-level reliability and strong expansibility which can smoothly configure the functional board CARDS to cope with port demand scenarios of various specifications and sizes.
Network Packet Analysis Tools IT Operation And Maintain Tools In Network Packer Brokers 0

 

Unified Visibility Modules Source Management

 

The MATRIX-TCA traffic acquisition visibility system is the industry's first to use graphical-based centralized visual resource management to provide a WYSIWYG-based board resource management interface based on the Web interface on the main control card of the whole machine. The user can visually view the current chassis view, all inserted card views in the chassis, and the working status view of each board on the resource management panel to provide a simple management mechanism for complex board management.

 

Unified Traffic Visibility Policy View Management

 

The MATRIX-TCA traffic acquisition visibility system implements unified visual management of traffic collection and distribution strategies for all cards of the whole machine, and determines the master control based on certain master election rules. All slot card policies in the chassis will be completed in the main control card set. Do not manually switch to other cards.

Unified card port resources and configuration views. The unified interface is used to address the service interface of each board through the unified port type, slot number, sub-slot number, or port number. The port configuration and subsequent policies are implemented. Port naming can be visually referenced in the management configuration view, which greatly facilitates the user's management configuration.

Backplane topology hides data auto-routing. The whole machine provides centralized data automatic cross-board routing technology. Users only need to pay attention to the service interfaces of the front and rear panels without paying attention to the backplane connection topology. The visual management software will automatically calculate the cross-board data routing based on the actual board connection for policy application. Configuration coordination greatly simplifies user configuration.

A unified policy management configuration view. The device provides a centralized traffic distribution policy configuration management view. Users can flexibly define data acquisition and output policies in the board. They can also flexibly define cross-board load balancing, cross-board data collection, and offload output policies.

Convenient cards software version maintenance management. All boards use the same software version, and can be upgraded in various ways (based on WEB/TFTP/FTP, etc.) to simplify user maintenance and upgrade operations.

  
Large-capacity Network Visibility 10G/40G/100G Capture, Aggregation and Distribution Application


Network Packet Analysis Tools IT Operation And Maintain Tools In Network Packer Brokers 1
 
Span deployment the high-performance, high-capacity MATRIX-TCA-CG traffic acquisition visibility system to uniformly collect data traffic of any node location and any link type (10G/40G/100G) on the entire network, and then data traffic can be transmitted through the system. The size, structure, relationship, etc. are collated and analyzed. After the invisible data signal is converted into a visible entity, the user can copy, aggregate, and offload the required target data to each back-end system for depth detection and analysis according to system requirements.

In this configuration, live network traffic passes through the TAP, directly into the active tool and back into the network in real time. This allows the tool to analyze the traffic, manipulate packets, stop suspicious packets and take immediate action on the link to block malicious traffic. These tools include Active Firewall and Intrusion prevention systems (IPS/NGFW). The TAP in the active stack has unique bypass technology that sends a heartbeat to the active tool. If the tool goes off line for any reason, the TAP can bypass the tool keeping live network traffic flowing. When the heartbeat returns, traffic automatically returns to normal operation flowing through the tool. Managing and protecting network infrastructure and information requires focus. Each of these devices specializes on a very tight functional range. The example above is by no means a complete list of network monitoring, management and security tool options. There are many purpose built tools for applications such as Data Loss Protection (DLP), Customer Experience Management (CEM), and Identity Access Management (IAM). A simple web search will turn up a wide variety of devices that can be added to these links based on specific threats or required analysis. Having a multiple port TAP foundation allows tools to easily and safely be added, repurposed or changed depending on the immediate needs of the network. There is a logical step by step flow when developing a visibility strategy; access, capture, analyze, secure and remediate if necessary. Ideally, if the right strategy and tools are in place along with other organizational influences to be discussed later, the remediation step will hopefully not be required. However, as is often said, plan for the best but prepare for the worst.




 

Send your inquiry
Please send us your request and we will reply to you as soon as possible.
Send
Google Analytics -->