Home Companies Chengdu Shuwei Communication Technology Co., Ltd.

RoHS NEBS Level 3 Network Visibility Solutions , NPB SDN Network Visibility Tools

Chengdu Shuwei Communication Technology Co., Ltd.

Contact Us

[China] country

Trade Verify

Address: 2F, G4 of TianFu Software Park, Chengdu, China.

Contact name:Jerry

Inquir Now

Chengdu Shuwei Communication Technology Co., Ltd.

Verified Suppliers
  • Trust
    Seal
  • Verified
    Supplier
  • Credit
    Check
  • Capability
    Assessment

RoHS NEBS Level 3 Network Visibility Solutions , NPB SDN Network Visibility Tools

Country/Region china
City & Province chengdu sichuan
Categories Solar Chargers
InquireNow

Product Details

Traffic Visibility NPB SDN Traffic Capture and Distribution from TAP or SPAN Port

-Complete the sorting, processing and unified scheduling of east-west traffic and north-south traffic to meet the deployment requirements of the monitoring system.
-Complete the real-time collection of existing network traffic data, apply intelligent learning algorithms and big data modeling analysis, conduct in-depth analysis, and intuitively present the operating status and development law of server, user end, network node, network element equipment and message interaction , to provide a factual basis for network construction decisions.
-Complete accurate secondary positioning of network faults and abnormal data events, and retain all abnormal original data.
-Eventually achieve comprehensive, efficient, accurate, safe, and visualized one-stop management of user data assets, help users solve invisible, intangible, and intangible problems, and improve the operational support capabilities and troubleshooting efficiency of network business systems .


Network Packet Broker Specification and Module Type

Component typeProduct ModelBasic ParameterRemarks
ChassisNTCA-CHS-7U7S-DCHeight:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modularMust choose one
NTCA-CHS-7U7S-ACHeight:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular
Service cardNT-TCA-SCG10100G exchange card,10*QSFP28 interfaceChoose according to actual business needs
NT-TCA-CG10100G service card,10*QSFP28 interface
NT-TCA-XG2410G service card,24*SFP+ interface
NT-TCA-RTM-CG10100G RTM card,10*QSFP28 interface
NT-TCA-RTM-EXG2410G RTM card,24*SFP+ interface
  
TCA Visibility Embedded software systemNT-TCA-SOFT-PKG must

 
 
Machine Specification

ItemsSpecifications
Chassis sizeNTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D)
NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D)
Adapter chassis and powerPower supply
NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-7U7S-AC:220V AC
NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC)
NTCA-CHS-16U14S-AC:220V AC
Power:
NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W
NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W
NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W
NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W
Environment requirementWorking temperature:0℃~50℃
Storage temperature:-20℃~80℃
Working humidity:5%~95%,Non-condensation
Standard CertificationAdvanced®specification PICMG® 3.0 R2.0
RoHs,Designed for CE,FCC,NEBS Level 3
 

Network Packet Broker Visibility Value

- Efficient collection and management to realize value transformation
- Data multi-view, multi-dimensional presentation and full control
- Customized traffic control to ensure asset safety
- Accurate analysis, quick positioning, and reduced losses
- Traffic condition detection and early warning to reduce risk
- Instant attack hunting to ensure network security

Large-capacity Network Visibility 10G/40G/100G Capture, Aggregation and Distribution Application, Distribute Related Data from Network TAP to Rlated Security Tools


 

Span deployment the high-performance, high-capacity MATRIX-TCA-CG traffic acquisition visibility system to uniformly collect data traffic of any node location and any link type (10G/40G/100G) on the entire network, and then data traffic can be transmitted through the system. The size, structure, relationship, etc. are collated and analyzed. After the invisible data signal is converted into a visible entity, the user can copy, aggregate, and offload the required target data to each back-end system for depth detection and analysis according to system requirements.
In this configuration, live network traffic passes through the TAP, directly into the active tool and back into the network in real time. This allows the tool to analyze the traffic, manipulate packets, stop suspicious packets and take immediate action on the link to block malicious traffic. These tools include Active Firewall and Intrusion prevention systems (IPS/NGFW). The TAP in the active stack has unique bypass technology that sends a heartbeat to the active tool. If the tool goes off line for any reason, the TAP can bypass the tool keeping live network traffic flowing. When the heartbeat returns, traffic automatically returns to normal operation flowing through the tool. Managing and protecting network infrastructure and information requires focus. Each of these devices specializes on a very tight functional range. The example above is by no means a complete list of network monitoring, management and security tool options. There are many purpose built tools for applications such as Data Loss Protection (DLP), Customer Experience Management (CEM), and Identity Access Management (IAM). A simple web search will turn up a wide variety of devices that can be added to these links based on specific threats or required analysis. Having a multiple port TAP foundation allows tools to easily and safely be added, repurposed or changed depending on the immediate needs of the network. There is a logical step by step flow when developing a visibility strategy; access, capture, analyze, secure and remediate if necessary. Ideally, if the right strategy and tools are in place along with other organizational influences to be discussed later, the remediation step will hopefully not be required. However, as is often said, plan for the best but prepare for the worst.

 

Hot Products

Traffic Visibility NPB SDN Traffic Capture and Distribution from TAP or SPAN Port -Complete the ...
Wireshark Packet Analyzer VS Network Packet Sniffer Capture Analysis and Troubleshooting What is the ...
Network Packet Broker Http Network Sniffer VXLAN Header Stripping VXLAN Forwarding VXLAN Gateway ...
NetTAP Network Tap: A High-Performance Solution for Data Monitoring and Analysis Introduction: The ...
NetTAP Network Tap: A TAP Focus on Traffic Data Security Control Introduction NetTAP offering: ...
Inline Network TAP: A TAP Focus On Traffic Data Security Control Introduction NetTAP offering: ...