Product Details
Place of Origin: China
Brand Name: NetTAP®
Certification: CCC, CE, RoHS
Model Number: MATRIX-TCA-CG
Payment & Shipping Terms
Minimum Order Quantity: 1 SET
Price: Can Discuss
Packaging Details: Outer Carton plus Inner Foam
Delivery Time: 1-3 Working Days
Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram
Supply Ability: 100 sets per month
Deployment: |
Data Center Core Network, Edge, Backbone |
Visibility Tools: |
Data For Load Balance, Time Stamp, Deduplication, Slicing, Stripping, Etc |
NPBs Deployment: |
Out-of-band And Inline |
Reliability: |
PEM Module Power, Good Heat Dissipation Channel |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Etc |
Header Stripping: |
MPLS, GRE, VxLAN |
Deployment: |
Data Center Core Network, Edge, Backbone |
Visibility Tools: |
Data For Load Balance, Time Stamp, Deduplication, Slicing, Stripping, Etc |
NPBs Deployment: |
Out-of-band And Inline |
Reliability: |
PEM Module Power, Good Heat Dissipation Channel |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Etc |
Header Stripping: |
MPLS, GRE, VxLAN |
Network Visibility Fabrics IT Opertation and Maintain Tools in Network Packer Brokers
Network Visibility Fabrics IT Opertation and Maintain Tools
These packet manipulation are often essential for the proper functioning of network operations tools, out-of-band security tools, and inline security systems.
NPBs Network Operation Tools for Out-of-band and Inline Network Monitoring
- Decryption for out-of-band tools
- Load balancing on outer layer 2-4 across multiple analyzers/monitors
- Time stampin
- Load balancing on inner/encapsulated layer 2-4
- Across multiple analyzers/monitors
- Outbound layer 2-4 and layer 7 filtering, Inbound layer 2-4 filterin
- Packet slicing
- Data generation, traffic generation
- Intelligent data deduplication, Basic packet deduplication (layer 2/3)
- Tunneling protocol
- Advanced header stripping (MPLS, GRE, VxLAN)
- Header stripping (de-encapsulation)
- Data Masking
- Link aggregation without VLAN tagging
Machine Specification
Items | Specifications |
Chassis size | NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D) |
NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D) | |
NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D) | |
NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D) | |
Adapter chassis and power | Power supply |
NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC) | |
NTCA-CHS-7U7S-AC:220V AC | |
NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC) | |
NTCA-CHS-16U14S-AC:220V AC | |
Power: | |
NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W | |
NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W | |
NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W | |
NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W | |
Environment requirement | Working temperature:0℃~50℃ |
Storage temperature:-20℃~80℃ | |
Working humidity:5%~95%,Non-condensation | |
Standard Certification | Advanced®specification PICMG® 3.0 R2.0 |
RoHs,Designed for CE,FCC,NEBS Level 3 |
Network Packet Broker Specification and Module Type
Component type | Product Model | Basic Parameter | Remarks |
Chassis | NTCA-CHS-7U7S-DC | Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular | Must choose one |
NTCA-CHS-7U7S-AC | Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular | ||
Service card | NT-TCA-SCG10 | 100G exchange card,10*QSFP28 interface | Choose according to actual business needs |
NT-TCA-CG10 | 100G service card,10*QSFP28 interface | ||
NT-TCA-XG24 | 10G service card,24*SFP+ interface | ||
NT-TCA-RTM-CG10 | 100G RTM card,10*QSFP28 interface | ||
NT-TCA-RTM-EXG24 | 10G RTM card,24*SFP+ interface | ||
TCA Visibility Embedded software system | NT-TCA-SOFT-PKG | must |
What's the Matrix Modular Designed Plug-in Network Packet Broker to do?
With the acceleration of carrier broadband construction and the rapid development of 3G, 4G, and 5G networks, and with the popularity and development of big data and cloud computing technologies, data traffic is growing, and the bandwidth requirements for backbone networks and core networks are increasing. Since 2013, the major operators have begun to gradually upgrade the backbone network. The core backbone network transmission link media starts to be expanded from 10GPOS and 40GPOS links to 100G Ethernet links. It will inevitably lead to the continuous updating of big data collection and analysis technology. In the face of 100GE link environment with high bandwidth capacity, how to effectively meet the requirements of various national security, network security monitoring, operator intelligent pipeline DPI data collection and analysis will become a hot spot in the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction of the Internet and develop the MATRIX-TCA-CG Traffic Acquisition(Traffic Capture) Visibility System, and dedicated to the traffic collection and visual analysis application requirements on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG integrates free-steering output functions such as network flow collection/acquisition, aggregation, filtering, forwarding/distribution, and load balancing and provides an efficient solution for the flow analysis.
Matrix-TCA-CG is a network data visualization control device for high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE 40GE and 100GE links distributed intensively in operators mobile Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high carrier-level reliability and strong expansibility which can smoothly configure the functional board CARDS to cope with port demand scenarios of various specifications and sizes.
Unified Visibility Modules Source Management
The MATRIX-TCA traffic acquisition visibility system is the industry's first to use graphical-based centralized visual resource management to provide a WYSIWYG-based board resource management interface based on the Web interface on the main control card of the whole machine. The user can visually view the current chassis view, all inserted card views in the chassis, and the working status view of each board on the resource management panel to provide a simple management mechanism for complex board management.
Unified Traffic Visibility Policy View Management
The MATRIX-TCA traffic acquisition visibility system implements unified visual management of traffic collection and distribution strategies for all cards of the whole machine, and determines the master control based on certain master election rules. All slot card policies in the chassis will be completed in the main control card set. Do not manually switch to other cards.
Unified card port resources and configuration views. The unified interface is used to address the service interface of each board through the unified port type, slot number, sub-slot number, or port number. The port configuration and subsequent policies are implemented. Port naming can be visually referenced in the management configuration view, which greatly facilitates the user's management configuration.
Backplane topology hides data auto-routing. The whole machine provides centralized data automatic cross-board routing technology. Users only need to pay attention to the service interfaces of the front and rear panels without paying attention to the backplane connection topology. The visual management software will automatically calculate the cross-board data routing based on the actual board connection for policy application. Configuration coordination greatly simplifies user configuration.
A unified policy management configuration view. The device provides a centralized traffic distribution policy configuration management view. Users can flexibly define data acquisition and output policies in the board. They can also flexibly define cross-board load balancing, cross-board data collection, and offload output policies.
Convenient cards software version maintenance management. All boards use the same software version, and can be upgraded in various ways (based on WEB/TFTP/FTP, etc.) to simplify user maintenance and upgrade operations.
Large-capacity Network Visibility 10G/40G/100G Capture, Aggregation and Distribution Application
Span deployment the high-performance, high-capacity MATRIX-TCA-CG traffic acquisition visibility system to uniformly collect data traffic of any node location and any link type (10G/40G/100G) on the entire network, and then data traffic can be transmitted through the system. The size, structure, relationship, etc. are collated and analyzed. After the invisible data signal is converted into a visible entity, the user can copy, aggregate, and offload the required target data to each back-end system for depth detection and analysis according to system requirements.
In this configuration, live network traffic passes through the TAP, directly into the active tool and back into the network in real time. This allows the tool to analyze the traffic, manipulate packets, stop suspicious packets and take immediate action on the link to block malicious traffic. These tools include Active Firewall and Intrusion prevention systems (IPS/NGFW). The TAP in the active stack has unique bypass technology that sends a heartbeat to the active tool. If the tool goes off line for any reason, the TAP can bypass the tool keeping live network traffic flowing. When the heartbeat returns, traffic automatically returns to normal operation flowing through the tool. Managing and protecting network infrastructure and information requires focus. Each of these devices specializes on a very tight functional range. The example above is by no means a complete list of network monitoring, management and security tool options. There are many purpose built tools for applications such as Data Loss Protection (DLP), Customer Experience Management (CEM), and Identity Access Management (IAM). A simple web search will turn up a wide variety of devices that can be added to these links based on specific threats or required analysis. Having a multiple port TAP foundation allows tools to easily and safely be added, repurposed or changed depending on the immediate needs of the network. There is a logical step by step flow when developing a visibility strategy; access, capture, analyze, secure and remediate if necessary. Ideally, if the right strategy and tools are in place along with other organizational influences to be discussed later, the remediation step will hopefully not be required. However, as is often said, plan for the best but prepare for the worst.