Product Details
Place of Origin: China
Brand Name: NetTAP®
Certification: CCC, CE, RoHS
Model Number: NT-FTAP-54ECX
Payment & Shipping Terms
Minimum Order Quantity: 1 SET
Price: Can Discuss
Packaging Details: Outer Carton plus Inner Foam
Delivery Time: 1-3 Working Days
Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram
Supply Ability: 100 sets per month
Network Security: |
Such As ISD, WAF, Firewall, Virtual Private Network, Load Balancing Equipment, Etc. |
Network Visibility Management: |
Such As IDS, DB Audit, Behavior Audit, Operation And Maintenance Audit, Data-oriented Management And Control, Virus Monitoring, WEB Protection, Compliance Analysis And Control |
Network Traffic Strategy: |
Network Data Deep Analysis, Accurately Present The Proportion Of Each Network Application |
Traffic Distribution Based On Strategy: |
NPB Loading Balance To The WAF & DBM Devices,NO Need Their Inline Connection |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries |
Related Solutions: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
Network Security: |
Such As ISD, WAF, Firewall, Virtual Private Network, Load Balancing Equipment, Etc. |
Network Visibility Management: |
Such As IDS, DB Audit, Behavior Audit, Operation And Maintenance Audit, Data-oriented Management And Control, Virus Monitoring, WEB Protection, Compliance Analysis And Control |
Network Traffic Strategy: |
Network Data Deep Analysis, Accurately Present The Proportion Of Each Network Application |
Traffic Distribution Based On Strategy: |
NPB Loading Balance To The WAF & DBM Devices,NO Need Their Inline Connection |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries |
Related Solutions: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
NetTAP® IDS / WAF Network Packet Broker and Network TAP to Protect your Network Security by Virus Protection
1. Product Background
With the rapid development of Internet business in recent years, the market competition is becoming increasingly fierce, and the quality of network and service has become a magic weapon to win the market competition.The safety, stability and efficiency of the Internet are directly related to operating income and business quality.On the other hand, with the further reform of Internet platform business, operators, enterprises and institutions are bound to further expand the scope of connectivity, while how to ensure the reliability and security of interconnectivity between networks is an important challenge for operation and maintenance departments and related departments.There are more and more businesses operating on the Internet, and more and more end users, which means more and more traffic carried on the Internet, more and more complex protocols, and more and more serious security threats.Therefore, how to receive a large amount of network data by various network traffic analysis and monitoring devices, effectively and accurately convert the data into valuable analysis, and reduce user network risks and operation and maintenance costs is a major problem currently facing.
2. Intelligent Traffic Processing Abilities
UDF Matching
Supported the matching of any key field in the first 128 bytes of a packet. Customized the Offset Value and Key Field Length and Content, and determining the traffic output policy according to the user configuration
Network Message Disitribution & Packet Distribution
A message splitting method based on multiple hash is characterized as follows: the method USES two hash algorithms to calculate two hash results respectively, USES one of the hash results to search the result of the spatial primary table as the benchmark index, and USES the other hash result to search the result of the spatial subtable as the auxiliary index to modify the benchmark index.
NetTAP® Visibility Platform
Supported NetTAP® Matrix-SDN Visual Control Platform Access
1+1 Redundant Power System(RPS)
Supported 1+1 Dual Redundant Power System
NT-FTAP-54ECX Network TAP NPB.pdf
3. Typical Application
Data Center Of Area:
Telecom,
Broadcasting,
Government,
Finance,
Energy,
Power,
Petroleum,
Hospital,
School,
Enterprise
And Other Industries
4. NetTAP® Visibility Platform and Network Optimization.
- Network Packer Broker called NPB, Loading Balance to the WAF & DBM devices,NO need their Inline Connection
- Reduce the Cost of Monitoring, improve the Efficiency of Monitoring
- More application for 25G/50G/100G, bandwidth crazy growing
- Virtualized cloud computing drives both north-south and east-west traffic growth
- Main applications based on B/S architecture, with higher bandwidth requirements, more interaction open, and business changes faster
- Network operation and maintenance: single network management - network performance monitoring, network backtracking, anomaly monitoring - AIOPS
- More security management and control, such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control,
Virus Monitoring, WEB Protection, Compliance Analysis and Control
- Network Security – from Access control, Threat Detection and Protection to the core of Data Security
5. Specifications
System Function | Traffic Processing | Traffic replication / aggregation / distribution | support |
Load Balance | support | ||
Diverting based on IP / protocol / port Five tuple traffic identification | support | ||
UDF Match | support | ||
Single Fiber Rx/Tx | support | ||
Ethernet encapsulation independence | support | ||
Process Abilities | 1.8Tbps | ||
Management | CONSOLE Network Management | support | |
IP/WEB network management | support | ||
SNMP network management | support | ||
TELNET/SSH network management | support | ||
SYSLOG Protocol | support | ||
RADIUS or AAA Centralized authorization |
support | ||
User authentication function | Password authentication based on user name |
*THE MORE ADVANCED FUNCTIONS WILL BE LAUNCHED SOON*