|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|Network Link:||Multimode Optical Protection Link||Network Security:||Implement A Security Pool Inline Security Tool|
|Network Monitor:||Monitoring Security Tools Status Is Depend On Heartbeat Package||Power Supply:||1+1 Dual Redundant Power System|
|Applications::||Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries||Related Solutions::||Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize|
inline network tap,
INLINE Network Security Bypass Switch based on Network TAP Strategic Traffic Protector
With the rapid development of the Internet, the threat of network information security is becoming more and more serious, so a variety of information security protection applications are used more and more widely. Whether it is traditional access control equipment (firewall) or a new type of more advanced protection means such as intrusion prevention system (IPS),Unified threat management platform (UTM), Anti-denial service attack system (Anti-DDoS), Anti-spam Gateway, Unified DPI Traffic Identification and Control System, and many security devices are deployed in series in the network key nodes, the implementation of the corresponding data security policy to identify and deal with legal / illegal traffic. At the same time, however, the computer network will generate a large network delay or even network disruption in the case of fail over, maintenance, upgrade, equipment replacement and so on in a highly reliable production network application environment, users cannot stand it.
2.Intelligent Bypass Swtich Application Solution
The risk of serial Network Security of Bypass Switch, Bypass TAP equipment (IPS / FW)
The above is a typical IPS (Intrusion Prevention System), FW (Firewall) deployment mode, IPS / FW is deployed in series to the network equipment (routers, switches, etc.) between the traffic through the implementation of network security checks, according to the corresponding network security policy to determine the release or blocking the corresponding traffic, to achieve the effect of network security defense.
3. Bypass Switch Bypass TAP Technical Characteristics
The NetTAP® "INLINE Network Security Bypass Swtich based on Network TAP Strategic Traffic Protector" supports serial protection for complete link traffic and a serial protection mode for a specific traffic type. Users can choose the appropriate deployment mode according to the deployment requirements of different security devices.
FullLink protection mode. In this mode, the Policy Traffic Traction Protector forwards all traffic from the deployed link to the security device and performs real-time monitoring of the state of the security device. If the status of the security device is abnormal, the protector will automatically switch to the bypass state ensures network availability.
SepcFlow protection mode. In this mode, the Policy Traffic Traction Protector forwards some of the user-specified traffic types in the deployment link to the security device for processing. The remaining traffic is automatically bypassed without passing through the security device. While the protector on the state of the safety device to perform real-time monitoring, once the safety device status is abnormal, the protector will automatically switch to bypass state to ensure the availability of the network.
4. Bypass Switch Bypass TAP Technical Specifications
|NT-FBYP-L1X-SR||1U chassis, 1*10GE multimode optical protection link|
|NT-FBYP-L1X-LR||1U chassis, 1*10GE single-mode optical protection link|
|NT-FBYP-L1G-SX||1U chassis, 1*GE multi-mode optical protection link|
|NT-FBYP-L1G-LX||1U chassis, 1*GE single mode optical protection link|
|NT-CBYP-L1G||1U chassis, 1*GE electrical protection link|
|NT-CBYP-L2G||1U chassis, 2*GE electrical protection link|
|NT-FBYP-L2G-SX5||1U chassis, 2*GE multi-mode optical protection link|
|NT-FBYP-L2G-LX||1U chassis, 2*GE single-mode optical protection link|
|NT-FCBYP-L4XG-SR||1U chassis, 2*GE electrical protection link, 1*GE multi-mode optical protection link, 1*10GE multimode optical protection link|
|NT-FCBYP-L4XG-LR||1U chassis, 2*GE electrical protection link, 1*GE single mode optical protection link, 1*10GE single mode optical protection link|
Contact Person: Jerry
Network Packet Broker with Tunneling Protocol Identify Net TAP with Data Deduplication
ACL Access Control List Functionality in NPB Dynamic Packet Filter
Vlan Tagged Untagged In Gigabit Ethernet Tap , Network Tap Vendors
Network Deduplication Virtual Network Tap Optimize Network Speed And Visibility
Net TAP Security Network Packet Generator for Public Cloud Private Cloud and Hybrid Cloud
VXLAN Header Stripping Network Packet Broker With VTEP Message Transfer Via Multicast
Network Packet Broker Http Network Sniffer VXLAN Header Stripping VXLAN Forwarding
480Gbps Network Packet Sniffer With Data Deduplication And Data Slicing Ethernet Packet Sniffer
Wireshark Packet Analysis VS Network Packet Sniffer Capture Analysis And Troubleshooting