Home ProductsNetwork Packet Sniffer

NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping

NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping

    • NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping
  • NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping

    Product Details:

    Place of Origin: China
    Brand Name: NetTAP®
    Certification: CCC, CE, RoHS
    Model Number: MATRIX-TCA-CG; NT-FTAP-32QCX

    Payment & Shipping Terms:

    Minimum Order Quantity: 1 SET
    Price: Can Discuss
    Packaging Details: Outer Carton plus Inner Foam
    Delivery Time: 1-3 Working Days
    Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram
    Supply Ability: 100 sets per month
    Contact Now
    Detailed Product Description
    Tunneling Protocols: GTP, GRE, PPTP, L2TP And PPPOE GRE Tunneling: Generic Routing Encapsulation
    GRE Tunnel: Carry MPLS LDP Messages, Established LDP LSP Encapsulation Stripping: Stripping VXLAN, GTP, GRE, MPLS Headers
    Applications: Multi-protocol Local Network To Protect Multicast Data Security: Data Protection, Prevent Leakage
    High Light:

    network sniffer tool

    ,

    wireshark packet sniffer

    Network Packet Broker GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping
     
    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 0 Tunneling Protocol Identify Technology in Network Packet Broker
    Supported automatically identify various tunneling protocols such as GTP / GRE / PPTP / L2TP / PPPOE. According to the user configuration, the traffic output strategy can be implemented according to the inner or outer layer of the tunnel
     
    What is GRE Tunneling Protocol?
    GRE(Generic Routing Encapsulation)can encapsulate Data packets of some network layer protocols (such as IPX, ATM, IPv6, AppleTalk, etc.)  so that these encapsulated data packets can be transmitted in another network layer protocol (such as IPv4).GRE provides a mechanism for encapsulating messages of one protocol in another. It is a three-layer tunneling technique that allows messages to be transmitted transparently through the GRE tunnel, solving the transmission problem of heterogeneous networks.
    GRE implementation mechanism is simple, the tunnel at both ends of the equipment burden.The GRE tunnel can connect to the local network of various network protocols through the IPv4 network, effectively utilizing the original network architecture and reducing the cost.The GRE tunnel extends the scope of hop-limited network protocols to enable flexible enterprise network topologies.The GRE tunnel can encapsulate multicast data and ensure the security of voice, video and other multicast services when combined with IPSec.GRE tunnel support enables MPLS LDP. GRE tunnel is used to carry MPLS LDP messages, LDP LSP is established, and MPLS backbone network is interoperable.The GRE tunnel connects discrete subnets and is used to set up VPNS for secure connections between corporate headquarters and branches.
     
    The protocol responsible for forwarding encapsulated packets is called the transport protocol.

    GRE header Fields Explain
    C

    Check and verify bits
    The position 1, indicates that the GRE header inserts the Checksum field
    The position 0, indicates that the GRE header does not contain checksum fields

    K

    Keyword bits.
    The position 1, indicates that the GRE header is inserted with a Key field
    The position 0, indicates that the GRE header does not contain keyword fields

    Recursion

    Represents the number of encapsulated layers of a GRE message. Add 1 to this field after completing a GRE package. Discard the text if the number of packages is greater than 3.The purpose of this field is to prevent messages from being encapsulated an infinite number of times.
     
    RFC1701 specifies that the default value for this field is 0.RFC2784 specifies that no exception will be raised if the field is inconsistent between the sender and receiver, and the receiver must ignore the field.
     
    When the device is implemented, this field is only used as the number of nested layers in the tag tunnel when adding the encapsulated message. This field is not perceived when GRE unpacks the message, so it will not affect the processing of the message.

    Flags Reserved fields. Must be set to 0 currently
    Version Version field. It has to be 0
    Protocol Type Identifies the protocol type of passenger agreement. The common passenger protocol is the IPv4 protocol with the protocol code 0x0800
    Checksum Checksum fields for GRE headers and their loads.
    Key Keyword field, the tunnel receiver is used to verify the received message.

     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    Network Packet Broker Tuneling Label stripping at GRE Application Scenarios 
    4) Set up L2VPN and L3VPN through GRE tunnel
    In general, MPLS VPN backbone networks usually use LSP as the public network tunnel.If the core device (P device) of the backbone does not have MPLS, and the edge device (PE device) does, then the backbone cannot use LSP as the public network tunnel.At this point, the backbone can use the GRE tunnel instead of the LSP to provide a layer 3 or 2 VPN solution on the backbone.
    LDP over GRE technology enables MPLS LDP on the GRE tunnel interface, USES the GRE tunnel to carry MPLS LDP messages, and establishes LDP LSP.
    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 1
    As shown in the figure above, an enterprise deploying L2VPN or L3VPN services between PE1 and PE2 needs to establish a LDP LSP across the GRE tunnel between PE1 and PE2 due to the fact that the backbone equipment may not be enabled or support MPLS.
    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 2
    As shown in the figure above, a ldp-lsp across the GRE tunnel can be established by establishing a GRE tunnel between PE1 and P2 when MPLS is supported by the backbone P2 device, but not by the P1 device.
     
    5) GRE tunnel was adopted for CE to access MPLS VPN
    VPN service based on MPLS backbone network can provide better service than traditional IP VPN.Therefore, MPLS VPN technology is the mainstream VPN technology chosen by operators.But the Internet is based on IP technology, and the backbone network based on IP technology is still abundant.
    In MPLS VPN, a direct physical link between CE (Customer Edge) and PE (Provider Edge) devices of MPLS backbone network is often required to connect the client device CE (Customer Edge) to the VPN, that is, in the same network.In such a network, the VPN needs to be associated with the PE to CE physical interface on the PE.
    However, in the actual network, not all CE and PE can be directly connected by physical links.For example, many organizations that are already connected to the Internet or ip-based backbone networks are geographically far apart from their CE and PE devices, making direct access to MPLS backbone PE devices impossible.This prevents direct access to MPLS VPN sites from the Internet or the IP backbone.
    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 3
    To make CE accessible to MPLS VPN, consider creating a "logical direct connection" between CE and PE.That is, you can connect CE and PE using a public or private network and create a GRE tunnel between CE and PE.In this way, can be regarded as CE and PE directly connected.When you associate a VPN with the pe-ce interface on a PE, you can use the GRE tunnel as a physical interface on which to associate a VPN.
     
    5.1 GRE through the public net
    5.2 GRE for VPN traversal
    5.3 GRE for private networks
    What kind Network Packet Broker and Network Taps support Tunneling Protocol Identify Technology?
    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 4
      
     NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 5
     
    Network Packet Broker Specification and Module Type

    Component type Product Model Basic Parameter Remarks
    Chassis NTCA-CHS-7U7S-DC Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular Must choose one
    NTCA-CHS-7U7S-AC Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular
    Service card NT-TCA-SCG10 100G exchange card,10*QSFP28 interface Choose according to actual business needs
    NT-TCA-CG10 100G service card,10*QSFP28 interface
    NT-TCA-XG24 10G service card,24*SFP+ interface
    NT-TCA-RTM-CG10 100G RTM card,10*QSFP28 interface
    NT-TCA-RTM-EXG24 10G RTM card,24*SFP+ interface
    TCA Visibility Embedded software system NT-TCA-SOFT-PKG   must

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    NPB Network Packet Sniffer GTP GRE PPTP L2TP PPPOE Tunneling Protocol Label Header Stripping 6NT-FTAP-32QCX Network TAP NPB.pdf

    Contact Details
    Chengdu Shuwei Communication Technology Co., Ltd.

    Contact Person: Jerry

    Tel: +86-13679093866

    Send your inquiry directly to us
    Other Products
    Google Analytics -->