Send Message
Chengdu Shuwei Communication Technology Co., Ltd.
Chengdu Shuwei Communication Technology Co., Ltd.
products
Home /

products

Network Data Broker Government Network Security Services for Data Loss Protection

Product Details

Place of Origin: China

Brand Name: NetTAP®

Certification: CCC, CE, RoHS

Model Number: NT-TCA-CG10

Payment & Shipping Terms

Minimum Order Quantity: 1 SET

Price: Can Discuss

Packaging Details: Outer Carton plus Inner Foam

Delivery Time: 1-3 Working Days

Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram

Supply Ability: 100 sets per month

Get Best Price
Contact Now
Specifications
High Light:

3.2Tbps Network Security Services

,

CE Network Security Services

,

Network TAP for DLP

Data Exchange:
Up To 3.2Tbps
100G/40G Link:
10 QSFP28 100GE Or 24 10GE SFP+ Interfaces
Traffic Mapping:
To Various Tools For Analytics, Performance Enhancement And Security
BASE Interface:
13*1000Minter-board Communication Interface
Applications:
For DLP, CEM, IAM
Value:
Improving Network Security Efficiency
Data Exchange:
Up To 3.2Tbps
100G/40G Link:
10 QSFP28 100GE Or 24 10GE SFP+ Interfaces
Traffic Mapping:
To Various Tools For Analytics, Performance Enhancement And Security
BASE Interface:
13*1000Minter-board Communication Interface
Applications:
For DLP, CEM, IAM
Value:
Improving Network Security Efficiency
Description
Network Data Broker Government Network Security Services for Data Loss Protection

Network Data Broker for Data Loss Protection Improving Network Security Efficiency

What is Network TAP?
Network TAPs are stand-alone devices that mirror and replicate all traffic flowing between two network endpoints (nodes). This can then be output to various network tools while live traffic continues to pass through the network.
​What is TAP?
TAPs (Test Access Points) are independent of the network, which means they are fully configurable. This allows security and/or performance tools to perform complex packet manipulations.
TAP is the foundation for intelligent network access, maintaining full visibility of security and monitoring platforms without compromise.
Live network traffic passes through the TAP, directly into the active tool, and back to the network in real time. This enables the tool to analyze traffic, act on packets, stop suspicious packets, and take immediate action on links to block malicious traffic. These tools include Active Firewalls and Intrusion Prevention Systems (IPS/NGFW). The TAP in the active stack has a unique bypass technology that sends a heartbeat signal to the active tool. If the tool goes offline for any reason, TAP can bypass the tool, maintaining real-time network traffic. When the heartbeat returns, flow automatically returns to normal operation through the tool. Managing and securing network infrastructure and information requires focused attention. Each of these devices is dedicated to a very tight functional range. The examples above are by no means a comprehensive list of network monitoring, management, and security tool options. There are many tools built specifically for applications, such as Data Loss Prevention (DLP), Customer Experience Management (CEM), and Identity Access Management (IAM). A simple web search will reveal a wide variety of devices that can be added to these links based on the specific threat or desired analysis. With a multi-port TAP foundation, tools can be easily and safely added, repurposed or changed based on the immediate needs of the network. When developing a visibility strategy, there is a logical step-by-step process; access, capture, analyze, secure and, if necessary, remediate. Ideally, if the right strategies and tools are in place, along with other organizational implications that will be discussed later, then hopefully no remedial steps will be required. However, as it is often said, prepare for the best but prepare for the worst.

 

Mobile operator 100G DPI distributing project


According to the user's business needs and system status, NT-FTAP-52CX is used to collect the 100G links of the provincial network and the backbone network, and then through IP quintuples, vlan tags, message characteristics, and fixed fields, the entire collection and distribution system supports up to 12 100G port input and 144 10G ports output data for back-end DPI analysis system, providing powerful requirements for different data requirements;

Network Data Broker Government Network Security Services for Data Loss Protection 0


Network Packet Broker Specification and Module Type

Component type Product Model Basic Parameter Remarks
Service card NT-TCA-SCG10 100G exchange card,10*QSFP28 interface Choose according to actual business needs
NT-TCA-CG10 100G service card,10*QSFP28 interface
NT-TCA-XG24 10G service card,24*SFP+ interface
NT-TCA-RTM-CG10 100G RTM card,10*QSFP28 interface
NT-TCA-RTM-EXG24 10G RTM card,24*SFP+ interface
   
TCA Visibility Embedded software system NT-TCA-SOFT-PKG   must

 

 

Items Specification
Card name NT-TCA-SCG10 100G service exchange card
Interface type Support 10*QSFP28 100GE/40GE interface
Additional support 10*QSFP28 100GE/40GE interface (used with RTM card)
exchange capacity 3.2Tbps(including Cross-board service exchange capability)
Deployment mode Support optical splitting/mirror span
data processing ability support replication/aggregation/filtering
support dynamic load balancing
Support IP/protocol/port seven-tuple traffic identification filtering
Support UDF custom offset matching filtering
Support for inner and outer identification split in tunnel protocols
Support for Ethernet encapsulation independence support
Support more than 1 million basic IPv4 seven-tuple rules
Support Ethernet L2-L4 layer protocol identification
Support data forwarding between cards
system management ability Support unified monitoring and management of the whole machine working environment
Support unified management of data processing strategies
Support unified management of software version of the whole machine
Support the whole machine control board election management
Support CONSOLE management
Support IP/WEB management
Support SNMP management
Support TELNET/SSH management
Support SYSLOG
 
Machine Specification
Items Specifications
Chassis size NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
Adapter chassis and power Power supply
NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-7U7S-AC:220V AC
NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-16U14S-AC:220V AC
Power:
NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W
NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W
NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W
NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W
Environment requirement Working temperature:0℃~50℃
Storage temperature:-20℃~80℃
Working humidity:5%~95%,Non-condensation
Standard Certification Advanced®specification PICMG® 3.0 R2.0
RoHs,Designed for CE,FCC,NEBS Level 3
 
Certificate
 
After years of developing, NetTAP has obtained high-tech enterprise certification, software product registration certificate, a number of product copyrights, product CNAS certification, IOS9001 certification, SAFETY (safety) certification, CE certification , EMC certification, etc.
 
Network Data Broker Government Network Security Services for Data Loss Protection 1
Send your inquiry
Please send us your request and we will reply to you as soon as possible.
Send
Google Analytics -->