Sign In | Join Free | My burrillandco.com
Home > Screen Protectors >

NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection

    Buy cheap NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection from wholesalers
     
    Buy cheap NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection from wholesalers
    • Buy cheap NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection from wholesalers

    NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection

    Ask Lasest Price
    Brand Name : NetTAP®
    Model Number : NT-FTAP-54ECX
    Price : Can Discuss
    Payment Terms : L/C, D/A, D/P, T/T, Western Union, MoneyGram
    Supply Ability : 100 sets per month
    Delivery Time : 1-3 Working Days
    Certification : CCC, CE, RoHS
    • Product Details
    • Company Profile

    NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection

    NetTAP® IDS / WAF Network Packet Broker and Network TAP to Protect your Network Security by Virus Protection


    1. Product Background


    With the rapid development of Internet business in recent years, the market competition is becoming increasingly fierce, and the quality of network and service has become a magic weapon to win the market competition.The safety, stability and efficiency of the Internet are directly related to operating income and business quality.On the other hand, with the further reform of Internet platform business, operators, enterprises and institutions are bound to further expand the scope of connectivity, while how to ensure the reliability and security of interconnectivity between networks is an important challenge for operation and maintenance departments and related departments.There are more and more businesses operating on the Internet, and more and more end users, which means more and more traffic carried on the Internet, more and more complex protocols, and more and more serious security threats.Therefore, how to receive a large amount of network data by various network traffic analysis and monitoring devices, effectively and accurately convert the data into valuable analysis, and reduce user network risks and operation and maintenance costs is a major problem currently facing.


    2. Intelligent Traffic Processing Abilities​


    UDF Matching

    Supported the matching of any key field in the first 128 bytes of a packet. Customized the Offset Value and Key Field Length and Content, and determining the traffic output policy according to the user configuration


    Network Message Disitribution & Packet Distribution

    A message splitting method based on multiple hash is characterized as follows: the method USES two hash algorithms to calculate two hash results respectively, USES one of the hash results to search the result of the spatial primary table as the benchmark index, and USES the other hash result to search the result of the spatial subtable as the auxiliary index to modify the benchmark index.


    NetTAP® Visibility Platform

    Supported NetTAP® Matrix-SDN Visual Control Platform Access


    1+1 Redundant Power System(RPS)

    Supported 1+1 Dual Redundant Power System


    NT-FTAP-54ECX Network TAP NPB.pdf


    3. Typical Application

    Data Center Of Area:

    Telecom,

    Broadcasting,

    Government,

    Finance,

    Energy,

    Power,

    Petroleum,

    Hospital,

    School,

    Enterprise

    And Other Industries


    4. NetTAP® Visibility Platform and Network Optimization.

    • Strategic Traffic Protection(as following)


    • Traffic Distribution Based on Strategy

    - Network Packer Broker called NPB, Loading Balance to the WAF & DBM devices,NO need their Inline Connection
    - Reduce the Cost of Monitoring, improve the Efficiency of Monitoring


    • Traffic Distribution Based on Strategy

    - More application for 25G/50G/100G, bandwidth crazy growing

    - Virtualized cloud computing drives both north-south and east-west traffic growth

    - Main applications based on B/S architecture, with higher bandwidth requirements, more interaction open, and business changes faster

    - Network operation and maintenance: single network management - network performance monitoring, network backtracking, anomaly monitoring - AIOPS

    - More security management and control, such as IDS, DB Audit, Behavior Audit, Operation and Maintenance Audit, Data-oriented Management and Control,

    Virus Monitoring, WEB Protection, Compliance Analysis and Control

    - Network Security – from Access control, Threat Detection and Protection to the core of Data Security


    5. Specifications

    System FunctionTraffic ProcessingTraffic replication / aggregation / distributionsupport
    Load Balancesupport
    Diverting based on IP / protocol / port Five tuple traffic identificationsupport
    UDF Matchsupport
    Single Fiber Rx/Txsupport
    Ethernet encapsulation independencesupport
    Process Abilities1.8Tbps
    ManagementCONSOLE Network Managementsupport
    IP/WEB network managementsupport
    SNMP network managementsupport
    TELNET/SSH network managementsupport
    SYSLOG Protocolsupport

    RADIUS or AAA

    Centralized authorization

    support
    User authentication functionPassword authentication based on user name

    *THE MORE ADVANCED FUNCTIONS WILL BE LAUNCHED SOON*

    Quality NetTAP® IDS / WAF NPB Network Traffic Replicate to Protect your Network Security by Virus Protection for sale
    • Haven't found right suppliers
    • Our buyer assistants can help you find the most suitable, 100% reliable suppliers from China.
    • And this service is free of charge.
    • we have buyer assistants who speak English, French, Spanish......and we are ready to help you anytime!
    Submit Buying Request
    Send your message to this supplier
    *From:
    Your email address is incorrect!
    *Subject:
    Your subject must be between 10-255 characters!
    *Message:
    For the best results, we recommend including the following details:
    • --Self introduction
    • --Required specifications
    • --Inquire about price/MOQ
    Your message must be between 20-3,000
    Yes! I would like your verified suppliers matching service!
    Send your message to this supplier
     
    *From:
    *To: Chengdu Shuwei Communication Technology Co., Ltd.
    *Subject:
    *Message:
    Characters Remaining: (0/3000)
     
    Find Similar Products By Category:
    Inquiry Cart 0