Product Details
Place of Origin: China
Brand Name: NetTAP®
Certification: CCC, CE, RoHS
Model Number: NT-FTAP-54ECX
Payment & Shipping Terms
Minimum Order Quantity: 1 SET
Price: Can Discuss
Packaging Details: Outer Carton plus Inner Foam
Delivery Time: 1-3 Working Days
Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram
Supply Ability: 100 sets per month
Load Balance: |
Hash Algorithm According To L2-L7 Layer Characteristics |
Network Security: |
Traffic Data Security Visual Control |
Data Filtering: |
Customization Of The Original Data Filtering Strategy |
Intelligent Traffic Processing Abilities: |
Deep Packet Inspection As DPI |
Applications: |
Data Center Of Telecom, Broadcasting, Finance, Energy, Power, Petroleum, Enterprise, Other Industries |
Related Solutions:: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
System Function: |
Network Management |
Network Interface: |
Multi Interface |
Load Balance: |
Hash Algorithm According To L2-L7 Layer Characteristics |
Network Security: |
Traffic Data Security Visual Control |
Data Filtering: |
Customization Of The Original Data Filtering Strategy |
Intelligent Traffic Processing Abilities: |
Deep Packet Inspection As DPI |
Applications: |
Data Center Of Telecom, Broadcasting, Finance, Energy, Power, Petroleum, Enterprise, Other Industries |
Related Solutions:: |
Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize |
System Function: |
Network Management |
Network Interface: |
Multi Interface |
Hash Algorithm Network Device Virtualization Network Virtual TAP with Traffic Dynamic Load Balancing
1. The Meanings of Loading Balancing or Load Balance
Hash Algorithm with Traffic Dynamic Load Balancing for IDS WAF APM and NPM Network Security Appliance Network TAP can be based on the L2-L4 layer characteristics of load balancing hash algorithm to ensure the integrity of the data flow of the receiving session bypassing the interception When the link state changes, the split port group can be flexibly withdrawn (link DOWN) or added (link UP), and the split group traffic can be automatically redistributed to ensure the dynamic load balance of the port output traffic.
2. Intelligent Traffic Processing Abilities
Load Balance
Supported load balance Hash algorithm and session-based weight sharing algorithm according to L2-L7 layer characteristics to ensure that the port output traffic dynamic of load balancing
Data Balance
In the same node pool, after the system expands the capacity of new nodes, data migration is automatically initiated to transfer some data from other nodes to the new nodes, so as to make the distribution of system data balanced
NetTAP® Visibility Platform
Supported NetTAP® Matrix-SDN Visual Control Platform Access
1+1 Redundant Power System(RPS)
Supported 1+1 Dual Redundant Power System
3.Specifications
Hash Algorithm Network TAP with Traffic Dynamic Load Balancing for IDS WAF APM and NPM Network Security Device | |||
Network Interface | 25GE(10GE) | 48*SFP+ slots | |
100G(40G) | 6*QSFP28 slots | ||
Out of Band management interface |
1*10/100/1000M electrical interface |
||
Deployment mode | Optical Split | support | |
SPAN Mode | support | ||
System Function | Management | CONSOLE Network Management | support |
IP/WEB network management | support | ||
SNMP network management | support | ||
TELNET/SSH network management | support | ||
SYSLOG Protocol | support | ||
RADIUS or AAA Centralized authorization |
support | ||
User authentication function | Password authentication based on user name | ||
Electric(1+1 Redundant Power System-RPS) | Rated supply voltage | AC110~240V/DC-48V(Optional) | |
Rated power frequency | AC-50HZ | ||
Rated input current | AC-3A / DC-10A | ||
Rated power function | Max 280W | ||
Environment | Operating Temperature | 0-50℃ | |
Storage Temperature | -20-70℃ | ||
Operating Humidity | 10%-95%, Non-condensing | ||
User Configuration | Console Configuration | RS232 port,115200,8,N,1 | |
Password authentication | support | ||
Rack Height | Rack space (U) | 1U 445mm*44mm*505mm |
4. Typical Application Structures
Unified Schedule Application(as following)
In the above-mentioned network environment, according to different security monitoring and analysis systems such as back-end IDS, auditing, APT, Internet behavior management, etc., analyze the monitoring data objects, the total amount of raw data in different latitudes, different data protocols, and the data structure of different data flows and content, accurately identify useless ones, and don’t care about the current screen operations in the background, so as to realize the customization and visualization of the original data that users care about, and output to the background analysis equipment for processing, greatly improving the efficiency of the background system.
Load Balance Network Visibility for:
1- Traffic Data Source
2- Network Outgoing Visibility
3- Data Acquisition
4- Current Network Data Output Correlation
Current Network Topology -----------------> Matrix Network Topology -------------> Nework Analytics System