40GE 100GE TAP Aggregator TAP Switch
VPP Traffic Visualization Processor Network Packet Broker / Network TAP Switch
Non-modular flow traction protector
NT-iMXTAP-24G-E Technical White Paper
NT-VPP-5600 series Technical White Paper
NT-FTAP-32QCX Technical White Paper
NT-CFTAP-28XG-D Technical White Paper
Visual control based on the whole life cycle of bypass traffic data
The Solution of "Micro-burst" in SAPN traffic Collection Scenario
It should be responsive and delivered quickly to meet emergency needs
Traffic data deduplication & Path Analysis - the perfect solution
Traffic data Management - NSLP 2.
Backtracking analysis is perfectly applied to NSLP 2.0
The Evolution of traffic data management requirements
Cloud computing network traffic data management
Application of "Packet deduplication" in "Network Visualization Analysis"
Path tracking
Effectively identify and track the standard layer-3 routing and switching process of packets in the network.
NAT
It can effectively identify and track the source/destination NAT process of packets in the network without obtaining the real-time NAT session table on the existing network equipment.
Session association
Effective association of load balancing, firewall and other processing equipment before and after session association, including TCPSEQ modification and reorganization association.
Delay analysis
The forwarding delay of the same packet in two different capturing node locations was analyzed accurately.
Manufacturer's logo
Correspondence analysis of upstream and downstream device manufacturer identifiers helps users identify and sort out the association between topology and data packets.
Traffic data As the direct embodiment of user's IT business behavior, traffic data traceback analysis can provide user's IT behavior, conclusion, basis and certificate based on traffic data. The traffic generated by abnormal network access behavior or attack events may be fleeting. By crawling the network traffic, the parts that need to be concerned are extracted and post-hoc multi-dimensional analysis is carried out. It is of practical significance to realize real-time discovery, analysis and traceback for user critical business systems, applications and network behavior anomalies.
Data storage, with long-term, horizontally scalable data storage capabilities; Provides quintuple analysis as well as data summary information.
Behavior forensics, the ability to backtrack the stored data, can backtrack and analyze the network behavior that has occurred, and provide users with the tracking and forensics of network problems.
Traffic data download, also provide traffic data push to other security/behavior analysis system, related data can be secondary analysis.
Visualization of data traffic and data content.
Fault Behavior Analysis based on Big Data.
Network interaction It is the basis of business support, and ensuring the stability and reliability of the network is the necessary content of operation and maintenance management. Network operation and maintenance managers need to pay attention to key parameters such as network communication and network performance, and can find abnormal events and analyze and locate the root cause of problems through network interaction information. The related technologies of traffic traceback may include: full traffic collection, traffic analysis, protocol analysis, behavior analysis, trend analysis, intelligent learning, establishing intelligent baseline, etc. The forms of traffic traceback feedback may involve: network interaction process display, data visualization display, alarm, log, auxiliary decision-making basis, etc. Through the above means, we can provide network and security operation and maintenance management capabilities to achieve the goal of stable and reliable network. When the network is under security threats, we can rely on technical means and measures to realize investigation, traceability and forensics.
Survey
Capture and analyze the whole network traffic, investigate the illegal use of the network and accidents
traceability
It provides traffic data interaction analysis capabilities and traffic data path traceability capabilities, and relies on traffic big data analysis +AI and trend prediction methods to realize problem finding and positioning capabilities
Take the evidence
The structured storage data warehouse is constructed, including: network flow table, network interaction summary and index information, original data flow. Restorable Network Events and processes
Unknown threats
Traditional traffic control methods mainly detect and discover known problems, while traffic traceback focuses on discovering unknown threats through analysis
North direction interface
Traditional traffic control methods mainly detect and discover known problems, while traffic traceback focuses on discovering unknown threats through analysis