Intelligent Network Monitor Network TAP Based On Multiple Hash Algorithms

Brand Name:NetTAP®
Certification:CCC, CE, RoHS
Model Number:NT-FTAP-54ECX
Minimum Order Quantity:1 SET
Delivery Time:1-3 Working Days
Payment Terms:L/C, D/A, D/P, T/T, Western Union, MoneyGram
Contact Now

Add to Cart

Verified Supplier
Location: Chengdu Sichuan China
Address: 2F, G4 of TianFu Software Park, Chengdu, China.
Supplier`s last login times: within 23 hours
Product Details Company Profile
Product Details

Intelligent Network Monitor Network TAP Based On Multiple Hash Algorithms


Background of the Technology


1. With the rapid development of modern computer network technology, the packet shunt device can quickly and accurately distribute the massive data packets to each back-end server for further processing based on the different five-tuple information of the packets themselves.The efficient message shunt device is also the foundation of some other high-level network special equipment (such as firewall, virtual private network, load balancing equipment, etc.).

2. In a network environment, when the length of an IP message to be transmitted exceeds the MaximumTransmiss1n Unit (MTU), an IP message is divided into several IP messages, which are transmitted separately.Shard packets occupy a considerable proportion in the actual network environment, and due to the requirement of homology and homology and the normal disorder of packets, it puts forward high requirements for the processing of shard packets by the packet shunt equipment.


Short description of the Network TAP


A network tap is a system that monitors events on a local network.[citation needed] A tap is typically a dedicated hardware device, which provides a way to access the data flowing across a computer network.

The network tap has (at least) three ports: an A port, a B port, and a monitor port. A tap inserted between A and B passes all traffic (send and receive data streams) through unimpeded in real time, but also copies that same data to its monitor port, enabling a third party to listen.

Network taps are commonly used for network intrusion detection systems, VoIP recording, network probes, RMON probes, packet sniffers, and other monitoring and collection devices and software that require access to a network segment. Taps are used in security applications because they are non-obtrusive, are not detectable on the network (having no physical or logical address), can deal with full-duplex and non-shared networks, and will usually pass through or bypass traffic even if the tap stops working or loses power.


Intelligent Traffic Processing Abilities​


Network Message Disitribution & Packet Distribution

A message splitting method based on multiple hash is characterized as follows: the method USES two hash algorithms to calculate two hash results respectively, USES one of the hash results to search the result of the spatial primary table as the benchmark index, and USES the other hash result to search the result of the spatial subtable as the auxiliary index to modify the benchmark index.


Network Data Detection and Network Packet Sniffer

Network sniffer also known as video sniffer, through reading through the network card data and intelligent analysis filter, quickly find the need for audio and video information to download the real address, the high degree of intelligence of the software, is an excellent packet capture tools and network capture tools


100GE Network Data Capture and Data Acquisition Ability

25GE * 48 ports plus 100GE * 6 ports, Max Rx/Tx duplex processing, up to 1.8Tbps Traffic Data Transceiver at same time,

for network Data Acquisition and Data Capturing, simple Pre-processing


NetTAP® Network Traffic Visibility Platform

Supported NetTAP® Matrix-SDN Visual Control Platform Access


1+1 Redundant Power System(RPS)

Supported 1+1 Dual Redundant Power System


NT-FTAP-54ECX Network TAP NPB.pdf


Main Specifications


CONSOLE Network Managementsupported
IP/WEB network managementsupported
SNMP network managementsupported
TELNET/SSH network managementsupported
SYSLOG Protocolsupported

RADIUS or AAA

Centralized authorization

supported
User authentication functionPassword authentication based on user name
Rated supply voltageAC110~240V/DC-48V(Optional)
Rated power frequencyAC-50HZ
Rated input currentAC-3A / DC-10A
Rated power functionMax 280W

Factory show



Our after sale service


for each product you bought from us, we can provide about 3 years maintenance,and each product will be strictly tested before it leaves the factory, so Whether it is the price or quality can be assured to buy


China Intelligent Network Monitor Network TAP Based On Multiple Hash Algorithms supplier

Intelligent Network Monitor Network TAP Based On Multiple Hash Algorithms

Inquiry Cart 0