|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|Link Device Protection 1:||Policy Flow Traction Protector||Lin Device Protection 2:||Bypass Switch Data Flow|
|Network Monitor:||Monitoring Tools Depend On Heartbeat Package||Heartbeat Message Detection:||Customized Heartbeat On The IPS / FW For Health Testing|
|Applications::||Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries||Related Solutions::||Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize|
Link Protection of Network Security Bypass TAP for Packet Broker Strategic Traffic
With the rapid development of the Internet, the threat of network information security is becoming more and more serious, so a variety of information security protection applications are used more and more widely. Whether it is traditional access control equipment (firewall) or a new type of more advanced protection means such as intrusion prevention system (IPS),Unified threat management platform (UTM), Anti-denial service attack system (Anti-DDoS), Anti-spam Gateway, Unified DPI Traffic Identification and Control System, and many security devices are deployed in series in the network key nodes, the implementation of the corresponding data security policy to identify and deal with legal / illegal traffic. At the same time, however, the computer network will generate a large network delay or even network disruption in the case of fail over, maintenance, upgrade, equipment replacement and so on in a highly reliable production network application environment, users cannot stand it.
2.Intelligent Bypass Swtich Application Solution
Link Series Device Protection
Figure 1: Policy Flow Traction Protector Normal Working Data Stream
Figure 2: Policy Traffic Traction Protector Bypass Switch Data Flow
As shown in Figures 1 and 2, the NetTAP® "Policy Traffic Traction Protector" is deployed in series between network devices (routers, switches, etc.), and the data flow between network devices no longer leads directly to IPS / FW, NetTAP® "policy traction protector" to IPS / FW, when the IPS / FW due to overload, crash, software updates, policy updates and other conditions of failure, the "bypass switch" through intelligent heartbeat message detection Function of the timely discovery, and thus skip the faulty device, without interrupting the premise of the network, the rapid network equipment directly connected to protect the normal communication network; when the IPS / FW failure recovery, but also through intelligent heartbeat packets Detection of timely detection of the function, the original link to restore the security of enterprise network security checks.
NetTAP® "Bypass switch" has a powerful intelligent heartbeat message detection function, the user can customize the heartbeat interval and the maximum number of retries, through a custom heartbeat message on the IPS / FW for health testing, such as send the heartbeat check message to the upstream / downstream port of IPS / FW, and then receive from the upstream / downstream port of IPS / FW, and judge whether the IPS / FW is working normally by sending and receiving the heartbeat message.
3. Bypass Switch Bypass TAP Technical Characteristics
The NetTAP® "INLINE Network Security Bypass Swtich based on Network TAP Strategic Traffic Protector" supports serial protection for complete link traffic and a serial protection mode for a specific traffic type. Users can choose the appropriate deployment mode according to the deployment requirements of different security devices.
FullLink protection mode. In this mode, the Policy Traffic Traction Protector forwards all traffic from the deployed link to the security device and performs real-time monitoring of the state of the security device. If the status of the security device is abnormal, the protector will automatically switch to the bypass state ensures network availability.
SepcFlow protection mode. In this mode, the Policy Traffic Traction Protector forwards some of the user-specified traffic types in the deployment link to the security device for processing. The remaining traffic is automatically bypassed without passing through the security device. While the protector on the state of the safety device to perform real-time monitoring, once the safety device status is abnormal, the protector will automatically switch to bypass state to ensure the availability of the network.
4. Bypass Switch Bypass TAP Technical Specifications
|NT-FBYP-L1X-SR||1U chassis, 1*10GE multimode optical protection link|
|NT-FBYP-L1X-LR||1U chassis, 1*10GE single-mode optical protection link|
|NT-FBYP-L1G-SX||1U chassis, 1*GE multi-mode optical protection link|
|NT-FBYP-L1G-LX||1U chassis, 1*GE single mode optical protection link|
|NT-CBYP-L1G||1U chassis, 1*GE electrical protection link|
|NT-CBYP-L2G||1U chassis, 2*GE electrical protection link|
|NT-FBYP-L2G-SX5||1U chassis, 2*GE multi-mode optical protection link|
|NT-FBYP-L2G-LX||1U chassis, 2*GE single-mode optical protection link|
|NT-FCBYP-L4XG-SR||1U chassis, 2*GE electrical protection link, 1*GE multi-mode optical protection link, 1*10GE multimode optical protection link|
|NT-FCBYP-L4XG-LR||1U chassis, 2*GE electrical protection link, 1*GE single mode optical protection link, 1*10GE single mode optical protection link|
Contact Person: Jerry