Visibility
To meet the high expectations of customers who need to be permanently connected and require instantaneous application response times in a secure environment, organisations must continually monitor their services using multiple tools that cover various needs. These needs mostly require access to the information flowing through the network.

It is advisable to have a visibility layer that prevents these systems from operating at low performance levels and with limited or no access to the information they need, because this reduces and, in some cases, eliminates their analytical capacity.

Depositphotos_13635402_original

Network interconnection layer

Traditionally SPAN (mirror) ports have been used to extract traffic using the network electronics (switches, routers, etc.). Although this solution is still valid, in many cases it is advisable to supplement it with other mechanisms:

CAPA-3

SPLITTER TAP

Passive devices that obtain a copy of the traffic flowing through a 1G, 10G, 40G, 100G fibre optic link

COPPER TAP

An active device that bypasses a link to obtain a copy of data non-intrusively (Zero Delay)

VIRTUAL TAP

SW for extracting information from the “virtual” traffic between the various hosts of our virtualised infrastructure at the kernel level, with minimal impact on our systems.

Aggregation and filtering layer (Packet broker)

OOB layer that consolidates several information sources and the optimises the performance of the tools that connect to it:

CAPA-2

L2-L4 filtering (filtered by the 128 bytes of the header)

Timestamping or traffic source

Dynamic balancing of traffic by session

Elimination of duplicate packets

Adding multiple points of traffic to multiple outputs (any to any, many to many, any to many)

Media conversion

Elimination of payload or header fields

DPI layer (application level data inspection):

OOB layer that enables traffic analysis at application level (Layer 8):

CAPA-1

Decrypted SSL

Filtered traffic signature (L7/L8 filtering)

Generation of NetFlow with application traffic statistics by traffic signature

Dynamic traffic masking

KEY BENEFITS

Minimise monitoring and/or security components’ impact on the communications infrastructure

Increased visibility (100% available traffic)

Reduce the cost of investment in probes

Improved performance of monitoring and/or security systems

Increased staff productivity

MANUFACTURERS

Files to download