Place of Origin: | China |
Brand Name: | NetTAP® |
Certification: | CCC, CE, RoHS |
Model Number: | NT-FTAP-54ECX |
Minimum Order Quantity: | 1 SET |
---|---|
Price: | Can Discuss |
Packaging Details: | Outer Carton plus Inner Foam |
Delivery Time: | 1-3 Working Days |
Payment Terms: | L/C, D/A, D/P, T/T, Western Union, MoneyGram |
Supply Ability: | 100 sets per month |
Network Security Equipment: | Such As Firewall, Virtual Private Network, Load Balancing Equipment, Etc. | Network Capturing: | For All Kinds Of Analysis In Data Mining, Protocol Analysis, Signal Analysis, Security Analysis, Risk Control, Etc. |
---|---|---|---|
Network Applications: | Network Data Deep Analysis, Accurately Present The Proportion Of Each Network Application | Network Message Distribution: | Based On Multiple Hash Algorithms To Calculate Hash Results Respectively |
Applications: | Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries | Related Solutions: | Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
High Light: | network packet capture tools,capture internet traffic |
NetTAP® Network Traffic Capture by Network Packet Broker via Network Visibility Platform for your Data Center
1. Background Technology
2. Product Background
The NetTAP® Network TAP with Nework Traffic Analysis Visibility to Optimize Your Network, it is network data visualization control device developed by Chengdu Shuwei Communication Co., Ltd.(short as: NetTAP®) is a comprehensive product of the whole visual data collection, data unified scheduling management, pretreatment and redistribution.Network elements which can realize different location, different exchange routing node link centralized collection of data receiving, processing engine, through the analysis of the device's built-in high-performance data will be collected original data accurate identification, analysis, statistical summary and tag, the original data redistribution output, monitoring equipment to meet all kinds of analysis in data mining, protocol analysis, signal analysis, security analysis, risk control, etc. The required flow rate.
3. Intelligent Traffic Processing Abilities
Network Message Disitribution & Packet Distribution
A message splitting method based on multiple hash is characterized as follows: the method USES two hash algorithms to calculate two hash results respectively, USES one of the hash results to search the result of the spatial primary table as the benchmark index, and USES the other hash result to search the result of the spatial subtable as the auxiliary index to modify the benchmark index.
NetTAP® Visibility Platform
Supported NetTAP® Matrix-SDN Visual Control Platform Access
1+1 Redundant Power System(RPS)
Supported 1+1 Dual Redundant Power System
NT-FTAP-54ECX Network TAP NPB.pdf
4. Typical Application
Data Center Of Area:
Telecom,
Broadcasting,
Government,
Finance,
Energy,
Power,
Petroleum,
Hospital,
School,
Enterprise
And Other Industries
5. NetTAP® Visibility Platform and Network Optimization.
The data capture, packet capture of network traffic capture Points are deployed in the key positions of the network for network data acquisition and overall running status/trend control. Network Data Deep Analysis, accurately present the proportion of each Network Application.
- More application for 25G/50G/100G, bandwidth crazy growing
- Virtualized cloud computing drives both north-south and east-west traffic growth
- Main applications based on B/S architecture, with higher bandwidth requirements, more interaction open, and business changes faster
- Network operation and maintenance: single network management - network performance monitoring, network backtracking, anomaly monitoring - AIOPS
- More security management and control, such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control,
Virus Monitoring, WEB Protection, Compliance Analysis and Control
- Network Security – from Access control, Threat Detection and Protection to the core of Data Security
6. Specifications
System Function | Traffic Processing | Traffic replication / aggregation / distribution | support |
Load Balance | support | ||
Diverting based on IP / protocol / port Five tuple traffic identification | support | ||
UDF Match | support | ||
Single Fiber Rx/Tx | support | ||
Ethernet encapsulation independence | support | ||
Process Abilities | 1.8Tbps | ||
Management | CONSOLE Network Management | support | |
IP/WEB network management | support | ||
SNMP network management | support | ||
TELNET/SSH network management | support | ||
SYSLOG Protocol | support | ||
RADIUS or AAA Centralized authorization |
support | ||
User authentication function | Password authentication based on user name |
*THE MORE ADVANCED FUNCTIONS WILL BE LAUNCHED SOON*
Contact Person: Jerry
Tel: +86-13679093866
Network Packet Broker with Tunneling Protocol Identify Net TAP with Data Deduplication
ACL Access Control List Functionality in NPB Dynamic Packet Filter
Vlan Tagged Untagged In Gigabit Ethernet Tap , Network Tap Vendors
Network Deduplication Virtual Network Tap Optimize Network Speed And Visibility
Net TAP Security Network Packet Generator for Public Cloud Private Cloud and Hybrid Cloud
VXLAN Header Stripping Network Packet Broker With VTEP Message Transfer Via Multicast
Network Packet Broker Http Network Sniffer VXLAN Header Stripping VXLAN Forwarding
480Gbps Network Packet Sniffer With Data Deduplication And Data Slicing Ethernet Packet Sniffer
Wireshark Packet Analysis VS Network Packet Sniffer Capture Analysis And Troubleshooting