|Place of Origin:||China|
|Certification:||CCC, CE, RoHS|
|Minimum Order Quantity:||1 SET|
|Packaging Details:||Outer Carton plus Inner Foam|
|Delivery Time:||1-3 Working Days|
|Payment Terms:||L/C, D/A, D/P, T/T, Western Union, MoneyGram|
|Supply Ability:||100 sets per month|
|Data Process:||480Gbps||Data Masking:||Policy-based To Replace Any Key Field In The Raw Data|
|Overflow Alarm:||By Setting The Flow Overflow Alarm Threshold Value Of Each Port And Each Policy||Power Supply:||1 + 1 Redundant Power System(RPS)|
|Applications::||Data Center Of Telecom, Broadcasting, Government, Finance, Energy, Power, Petroleum, Hospital, School, Enterprise And Other Industries||Related Solutions::||Network Visibility, Network Monitor, Network Security, Network Analytics, Data Center, Traffic Management, Traffic Optimize|
Data Masking Network TAP,
Data Masking Network Packet Generator,
Traffic Management Network Packet Generator
Data Masking Network TAP and Network Packet Generator with Traffic Trend Alarming
NT-VPP-4860G is a powerful traffic visualization processor. It provides comprehensive traffic monitoring and alarm functions, and supports dual-level monitoring of ports and policies.
The product allows setting custom traffic thresholds for individual ports and policy flows. Once the interface or traffic approaches the threshold, the system will issue a timely warning to provide network operations with advance preparation time.
At the same time, it can visually display traffic change trends in different dimensions through real-time dynamic charts. Once an anomaly is detected, detailed log reports will also be generated for further analysis.
In addition, the product also supports the histo permission query function for the past two months. These in-depth traffic data records can effectively assist network planning and optimization.
Based on active monitoring, NT-VPP-4860G can detect potential traffic bottlenecks in advance to prevent service quality degradation. Overall, it provides the ability to understand comprehensive traffic management and locate and eliminate problems, becoming a powerful data support for network optimization.
2. Intelligent Traffic Processing Abilities
Traffic Threshold Alerting: Allows setting thresholds for ports and policies to monitor traffic and generate alerts upon bandwidth overflow or other conditions.
Historical Traffic Analytics: Provides query of up to 2 months of historical port-level and policy-level statistics by time range for traffic trend analysis.
Flexible Traffic Detection: Leverages configurable filters based on capture ports and L2-L7 headers to detect real-time traffic from different network points for subsequent expert analysis.
Comprehensive Packet Inspection: The DPI module performs multidimensional and statistical analysis of targeted captured packets for in-depth visualization and investigation of anomalies, streams, and transmissions.
Fault-tolerant Power Design: Reliability is ensured through the implementation of a 1+1 redundant power system to continuously power the solution in the event of a single power supply failure.
|Data Masking Network TAP and Network Packet Generator with Traffic Trend Alarming|
48*SFP+ slots, support 10GE/GE；
Support Single/Multiple mode fiber
|1*10/100/1000M electrical port；|
|Diagnosis and Monitoring||Real-time monitor||Support interface/policy|
|Traffic alarm||Support interface/policy|
|Historical traffic review||Support interface/policy|
|Traffic capture||Support interface/policy|
|Traffic Visibility Detection||Basic Analysis||Support summary statistical presentation of basic information such as Packet Count, Packet Class Distribution, Session Connection Number, Packet protocol Distribution, etc.|
Support transport layer protocol proportion analysis, unicast broadcast multicast proportion analysis, IP traffic proportion analysis, DPI application proportion analysis.
Support data content based on sampling time of traffic size analysis rendering.
Support data analysis and statistics based on session flow.
|Accurate Fault Analysis||
Support traffic data to provide different visual fault analysis and positioning, including:
Message Transmission Behavior Analysis, Data Stream Level Fault Analysis, Packet Level Fault Analysis, Security Fault Analysis, Network Fault Analysis.
|User authentication||Based on user’s password authentication|
4. Typical Application Structures
Centralized Collection Application(as following)
Unified Schedule Application(as following)
Contact Person: Jerry