Product Details
Place of Origin: China
Brand Name: NetTAP®
Certification: CCC, CE, RoHS
Model Number: NT-FTAP-32QCX
Payment & Shipping Terms
Minimum Order Quantity: 1 SET
Price: Can Discuss
Packaging Details: Outer Carton plus Inner Foam
Delivery Time: 1-3 Working Days
Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram
Supply Ability: 100 sets per month
ACL: |
Access Control List |
ACL Technology: |
Based On Dynamic Packet Filtering |
ACL Function: |
Limit Network Traffic And Improve Network Performance |
Network Interface: |
Decide The Traffic Forwarded And Blocked |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries |
Related Solutions: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
ACL: |
Access Control List |
ACL Technology: |
Based On Dynamic Packet Filtering |
ACL Function: |
Limit Network Traffic And Improve Network Performance |
Network Interface: |
Decide The Traffic Forwarded And Blocked |
Applications: |
Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries |
Related Solutions: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
ACL Access Control List Functionality in Network Packet Broker Dynamic Packet Filter
Access Control List (ACL) is an access control technology based on packet filtering, which can filter packets on the interface according to set conditions, allowing them to pass through or discard.Access control list is widely used in routers and three-layer switches. With the help of access control list, users can effectively control their access to the network, thus ensuring network security to the greatest extent.
Access Control Lists (ACLs) are Lists of instructions applied to the router interface.These instruction lists are used to tell the router which packets to accept and which to reject.Whether a packet is received or rejected can be determined by specific indications such as the source address, destination address, port number, and so on.
Access control lists have many functions, such as limiting network traffic and improving network performance;Control of traffic flow. For example, ACL can limit or simplify the length of routing update information, so as to limit traffic flow through a certain network segment of the router.Provide the basic means of network security access;Determine which type of traffic is forwarded or blocked at the router port. For example, users can allow E-mail traffic to be routed, deny all Telnet traffic, and so on.
Access control lists (acls) are not conceptually complex; what is more complicated is the configuration and use of them, and many beginners often make errors when using acls.
ACL Function in Network Packet Broker
1. Limit network traffic and improve network performance. For example, an ACL can specify that packets of this type have a higher priority, depending on the protocol of the packet, and can be processed in advance by the network device as such.
2. Provide control means for communication flow.
3. Provide basic security means for network access.
4. At the network device interface, decide which type of traffic is forwarded and which type of traffic is blocked.
For example, a user could allow E-mail traffic to be routed, denying all Telnet traffic.For example, if a department requires only the WWW function, it can be implemented through ACL.For example, an ACL can be used to implement a department that is not allowed to access the extranet or the extranet to access it for confidentiality reasons.
Application
Acls can be used in a variety of situations, the most common of which are as follows:
1. Filter the routing information transmitted between neighboring devices.
2. Control exchange access to prevent unauthorized access to the device, such as Console interface, Telnet or SSH access.
3. Control the flow of network equipment and network access.
4. Protect the router by restricting access to certain services on the router, such as HTP, SNMP and NIP.
5. Define streams of interest for DDR and IPSeC VPN.
6. Able to implement QoS(quality of service) features in IOS in a variety of ways.
7. Extended application in other security technologies, such as TCP interception and IOS firewall.
NT-FTAP-32QCX Network Packet Brokers(NPBs) Support the ACL(Access Control List) function
NT-FTAP-32QCX NetTAP® TAP/NPB Functional Parameters |
|||
Network Interface |
100G(compatible with 40G) |
32*QSFP28 slots |
|
Out band interface |
1*10/100/1000M cooper |
||
Deploy mode |
Fiber tap |
Support |
|
Mirror span |
Support |
||
System function |
Traffic processing |
Traffic replicating/aggregating/splitting |
Support |
Load-balancing |
Support |
||
Filter based on IP/protocol/port quintuple traffic identification |
Support |
||
Access Control List(ACL) |
Support |
||
UDF Matching |
Support |
||
Single fiber transmission |
Support |
||
Ethernet package independence |
Support |
||
Processing ability |
3.2Tbps |
||
Management |
CONSOLE MGT |
Support |
|
IP/WEB MGT |
Support |
||
SNMP MGT |
Support |
||
TELNET/SSH MGT |
Support |
||
SYSLOG Protocol |
Support |
||
RADIUS or AAA Centralized authorization |
Support |
||
User authentication |
Authentication based on username and password |
||
Electrical (1+1 Redundant Power System-RPS) |
Rated power supply voltage |
AC110~240V/DC-48V[Optional] |
|
Rated power frequency |
AC-50HZ |
||
Rated input current |
AC-3A / DC-10A |
||
Rated function power |
Max 450W |
||
Environment |
Operating temperature |
0-50℃ |
|
Storage temperature |
-20-70℃ |
||
Working humidity |
10%-95%, No condensation |
||
User Configuration |
Console Configuration |
RS232 interface,115200,8,N,1 |
|
Password authentication |
Support |
||
Chassis Height |
Rack Space (U) |
1U 445mm*44mm*505mm |