|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|Medical Industry Network Security Services:||Hospital Infomation Data Center Monitoring||COVID-19:||Cases Data Capture|
|SARS-CoV-2:||Detection Data Analysis||Medical Data Statistics:||Hospital Network Isolation And Information Data Exchange Construction Needs.|
|Applications::||Ata Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries||Related Solutions::||Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize|
network device management,
network tap device
COVID-19 Coronavirus Disease Data Capture and SARS-CoV-2 Detection by Network Packet Broker
1. Key Facts
Know the facts about coronavirus disease 2019 (COVID-19) and help stop the spread of rumors.
Diseases can make anyone sick regardless of their race or ethnicity.
Fear and anxiety about COVID-19 can cause people to avoid or reject others even though they are not at risk for spreading the virus.
For most people, the immediate risk of becoming seriously ill from the virus that causes COVID-19 is thought to be low.
Older adults and people of any age with underlying health conditions, such as diabetes, lung disease, or heart disease, are at greater risk of severe illness from COVID-19.
Someone who has completed quarantine or has been released from isolation does not pose a risk of infection to other people.
For up-to-date information, visit CDC’s coronavirus disease situation summary page.
There are simple things you can do to help keep yourself and others healthy.
* Wash your hands often with soap and water for at least 20 seconds, especially after blowing your nose, coughing, or sneezing; going to the bathroom; and before eating or preparing food.
* Avoid touching your eyes, nose, and mouth with unwashed hands.
* Stay home when you are sick.
* Cover your cough or sneeze with a tissue, then throw the tissue in the trash.
You can help stop COVID-19 by knowing the signs and symptoms:
* Shortness of breath
* Seek medical advice if you
* Develop symptoms
* Have been in close contact with a person known to have COVID-19 or live in or have recently traveled from an area with ongoing spread of COVID-19. Call ahead before you go to a doctor’s office or emergency room. Tell them about your recent travel and your symptoms.
2. Intelligent Traffic Processing Abilities of Network Packet Broker(Part)
ASIC Chip Plus Multicore CPU
480Gbps intelligent traffic processing capabilities
Supported L2-L7 packet filtering matching, such as SMAC, DMAC, SIP, DIP, Sport, Dport, TTL, SYN, ACK, FIN, Ethernet type field and value, IP protocol number, TOS, etc. also supported flexible combination of up to 2000 filtering rules.
Real-time Traffic Trend Monitoring
Supported real-time monitoring and statistics on port-level and policy-level data traffic, to show the RX / TX rate, receive / send bytes, No., RX / TX the number of errors, the maximum income / hair rate and other key indicators.
NetTAP® Visibility Platform
Supported NetTAP® Matrix-SDN Visual Control Platform Access
1+1 Redundant Power System(RPS)
Supported 1+1 Dual Redundant Power System
3. Typical Application Structures
NetTAP® Network TAP for Hospital Infomation Data Center Capturing / Monitoring the COVID-19 Coronavirus Disease and SARS-CoV-2 Detection in Medical Industry Network Security Services.
Description of Network Structure
The various departments of the hospital, such as outpatient toll collectors, inpatient staff, doctors and administrative staff
Through the central switch network interconnection and access to the internal server of the hospital.The outpatient service charge office can access the medical insurance network through DDN special line, and the payment system of the outpatient service charge office can interact with the bank information through the Internet.
People's hospital network isolation and information exchange construction needs
In view of the current network situation, according to the planning of informatization construction of our hospital, the following objectives should be achieved:
From the perspective of management and technology, establish a multi-layer security system to ensure the security and confidentiality of hospital network information and various systems.At the same time, while maintaining the isolation of hospital medical insurance, Internet and various hospital systems, moderate and controllable data exchange between internal and external networks is carried out.Protect the security of each system network of the hospital, achieve isolation, prevent the attack of hackers outside the network. Record the hospital data center network, hospital file exchange and mail transfer log in detail, so as to keep records.
Internal networks can easily be attacked by malicious intruders from external networks.
1- the intruder USES Sniffer and other Sniffer programs to detect and scan the network and operating system security vulnerabilities, such as network IP address, the type of application operating system, which TCP port number to open, the system to save user name and password and other security information key files, and through the corresponding attack program to attack the internal network.
2- intruders obtain the user name, password and other information of Intranet users through network monitoring and other advanced means, and then fake the internal legal identity to log in illegally and steal important information of Intranet.
3- malicious attack: the intruder sent a large number of pings to the Intranet important service, so that the server overworked to the denial of service and even the system crashed.
|NT-FTAP-48XE NetTAP® NPB Functional Parameters|
|Network Interface||10GE SFP+ ports||48 * SFP+ slots; support 10GE/GE; support for single and multi-mode fiber|
|Out of Band management interface||1* 10/100/1000M electrical interface；|
|Deployment mode||10Gigabit spectral acquisition||Support 24*10GE bidirectional fiber links acquisition|
|10Gigabit Mirror span acquisition||
Support up to 48 mirror span traffic ingress
|Optical Splitter input||Input port can support single-fiber ingress;|
|Port multiplexing||Support input ports simultaneously as output ports;|
|Traffic output||Support 48 *10GE ports traffic output;|
|Traffic replication / aggregation / distribution||support|
|Link QTYs supporting Mirror replication / aggregation||
1 -> N link traffic replication (N <48)
N-> 1 link traffic aggregation (N <48)
G Group(M-> N Link) traffic replication and aggregation [G * (M + N) <48]
|Distribution based on traffic identification||support|
|Distribution based on IP / protocol / port Five tuple traffic identification||support|
|Distribution strategy based on protocol header the key labeled traffic identifies||support|
|Ethernet encapsulation independence||support|
|CONSOLE network management||support|
|IP/WEB network management||support|
|SNMP network management||support|
|TELNET/SSH network management||support|
|User authentication function||
Password authentication based on user name
|Electric(1+1 Redundant Power System-RPS)||Rated supply voltage||AC110-240V/DC-48V [Optional]|
|Rated power frequency||AC-50HZ|
|Rated input current||AC-3A / DC-10A|
|Rated power function||200W|
|User Configuration||Console Configuration||RS232 Interface,115200,8,N,1|
|Rack Height||Rack space (U)||1U 485mm*44.5mm*350mm|
Contact Person: Jerry
Data Processing Ability: 480Gbps intelligent network data processing
Tunneling Protocol Identify: Identify the tunneling protocols such as GTP / GRE / PPTP / L2TP / PPPOE
UDF Match: Customized the Offset Value and Key Field Length and Content
Data Packets De-duplication: Save the APM and NPM analysis of system performance