Home Companies Chengdu Shuwei Communication Technology Co., Ltd.

DPI Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP

Chengdu Shuwei Communication Technology Co., Ltd.

Contact Us

[China] country

Trade Verify

Address: 2F, G4 of TianFu Software Park, Chengdu, China.

Contact name:Jerry

Inquir Now

Chengdu Shuwei Communication Technology Co., Ltd.

Verified Suppliers
  • Trust
    Seal
  • Verified
    Supplier
  • Credit
    Check
  • Capability
    Assessment

DPI Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP

Country/Region china
City & Province chengdu sichuan
Categories Software
InquireNow

Product Details

Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP

 

With network communication technology progress and development, network communication has entered the era of big data, how to monitor all kinds of business system of communication data transmission quality in the large data flow, and the category of vast amounts of network traffic data exists in the small amount of malicious traffic detection, avoid malicious communications for hosts, network devices, the root of security threats, and the communication content theft.Is the network management must face a difficult problem.

 

It is the law of nature that there is a spear to attack and a shield to defend itself.With the advent of big data, traditional real-time detection and defense are no longer capable of identifying subtle anomalies in massive data.Therefore, the real-time backup of original communication data gradually shows its necessity, and the backtracking analysis technology based on time window to detect the depth of packets is the microscope to find abnormal data.

 

Introduction to DPI technology

 

DPI(Deep Packet Inspection) technology is based on the traditional IP Packet Inspection technology (detection and analysis of Packet elements contained between OSI l2-l4), which adds application protocol recognition, Packet content detection and depth decoding of application layer data.

 

 

By capturing the original packets of network communication, DPI technology can use three kinds of detection methods: "eigenvalue" detection based on application data, recognition detection based on application layer protocol, and data detection based on behavior pattern.According to different detection methods, unpack and analyze the abnormal data that may be contained in the communication packet one by one to dig out the subtle data changes in the macro data flow.

 

 

DPI supports the following applications:

• the ability to manage traffic, or control end-user applications such as point-to-point applications

• security, resources, and licensing control

• policy enforcement and service enhancements, such as personalization of content or content filtering

The benefits include increased visibility into network traffic, which allows network operators to understand usage patterns and link network performance information to providing usage base billing and even acceptable usage monitoring.

DPI can also reduce the overall cost of the network by reducing operating expenses (OpEx) and capital expenditures (CapEx) by providing a more complete picture of how the network is operating and the ability to direct or intelligently prioritize traffic.

 

Deep Packet Inspection(DPI) in VPN Virtual Private Network Application

VPN is a remote access technology, which simply means using public network to set up private network.For example, if an employee of a company is on a business trip and wants to access server resources on the Intranet, such access is remote.

In the traditional enterprise network configuration, to carry out remote access, the traditional method is to rent DDN (digital data network) line or frame relay, such a communication scheme will inevitably lead to high network communication and maintenance costs.For mobile users (mobile office workers) and remote individual users, generally through the dial-up line (Internet) access to the enterprise's LAN, but this will inevitably bring security risks.

Let the non-local staff access to the Intranet resources, the use of VPN solution is to set up a VPN server in the Intranet.After connecting to the Internet locally, the non-local employees connect to the VPN server through the Internet, and then access the enterprise Intranet through the VPN server.In order to ensure data security, the communication data between VPN server and client is encrypted.With data encryption, can think the data is in a special secure transmission of data link, like specially set up a private network, but is actually a public link VPN are using the Internet, so called VPN virtual private network, its essence is to use encryption technology in public encapsulation out a data communications channel.With VPN technology, users can use VPN to access internal network resources as long as they have access to the Internet, no matter they are traveling or working at home. This is why VPN is so widely used in enterprises.

 

Recommend Network Packet Broker for Deep Packet Inspection VPN by Network Visibility Software Tools

 

 

 

Network Packet Broker Specifications

 

NT-FTAP-48XE NetTAP® NPB Functional Parameters
Network Interface10GE SFP+ ports48 * SFP+ slots; support 10GE/GE; support for single and multi-mode fiber
Out of Band management interface1* 10/100/1000M electrical interface;
Deployment mode10Gigabit spectral captureSupport 24*10GE bidirectional fiber links capture
10Gigabit Mirror span capture

Support up to 48 mirror span traffic ingress

 

Optical Splitter inputInput port can support single-fiber ingress;
Port multiplexingSupport input ports simultaneously as output ports;
Traffic outputSupport 48 *10GE ports traffic output;
Traffic replication / aggregation / distributionsupport
Link QTYs supporting Mirror replication / aggregation

1 -> N link traffic replication (N <48)

N-> 1 link traffic aggregation (N <48)

G Group(M-> N Link) traffic replication and aggregation [G * (M + N) <48]

Distribution based on traffic identificationsupport
Distribution based on IP / protocol / port Five tuple traffic identificationsupport
Distribution strategy based on protocol header the key labeled traffic identifiessupport
Ethernet encapsulation independencesupport
CONSOLE network managementsupport
IP/WEB network managementsupport
SNMP network managementsupport
TELNET/SSH network managementsupport
SYSLOG protocolsupport
User authentication function

Password authentication based on user name

 

Electric(1+1 Redundant Power System-RPS)Rated supply voltageAC110-240V/DC-48V [Optional]
Rated power frequencyAC-50HZ
Rated input currentAC-3A / DC-10A
Rated power function200W
EnvironmentOperating Temperature0-50℃
Storage Temperature-20-70℃
Operating Humidity10%-95%,Non-condensing
User ConfigurationConsole ConfigurationRS232 Interface,115200,8,N,1
Password authenticationsupport
Rack HeightRack space (U)1U 485mm*44.5mm*350mm
 

 

NT-FTAP-48XE Network TAP NPB.pdf

 

Plz contact NetTAP® directly to Optimize your Network now!

Hot Products

10GE Data Acquisition and Packet Acquisition Network Visibility Network TAP 1.Overviews A full ...
Network TAP for Bank Data Center Network Visibility Traffic Monitoring and Business Awareness ...
Traffic Visibility NPB SDN Traffic Capture and Distribution from TAP or SPAN Port - Complete the ...
Traffic Visibility NPB SDN Traffic Capture and Distribution from TAP or SPAN Port -Complete the ...
Ethernet Network TAP Inline Monitoring with Intelligent Bypass for Network Security TAP(Test Access ...
Why do You Need a Network Packet Broker(NPB) to Keep Your Networks Safe? 1. Product Background The ...