Model: | ML-NPB-5660 |
---|---|
Brand: | Mylinking™ |
Origin: | Made In China |
Category: | Electronics & Electricity / Telecommunication & Broadcasting / Network Communications Equipment |
Label: | packet broker , network tap , npb |
Price: |
US $5000
/ pc
|
Min. Order: | 1 pc |
Live Chat: | Last Online:22 Feb, 2023 |
Intelligent Traffic Processing Abilities
ASIC Chip Plus Multicore CPU
1.8Tbps intelligent network traffic processing capabilities. Built-in multi-core CPU can reach up to 60Gbps intelligent traffic processing capacity
10GE/25GE/40GE/100GE Traffic Data Capure
6 slots 100GE QSFP28 plus 48 slots 10GE/25GE SFP28 up to 1.8Tbps Traffic Data Transceiver at same time, for network Data Capture, simple Pre-processing
Network Traffic Replication
Packet replicated from 1 port to multiple N ports, or multiple N ports aggregated, then replicated to multiple M ports by Network Packet Broker
Network Traffic Aggregation
Packet replicated from 1 port to multiple N ports, or multiple N ports aggregated, then replicated to multiple M ports by Network Packet Broker
Data Distribution/Forwarding
Classified the incoming metdata accurately and discarded or forwarded different data services to multiple interface outputs according to user’s predefined rules.
Packet Data Filtering
Supported flexible combination of metdata elements based on Ethernet Type, VLAN Tag, TTL, IP seven-tuple, IP Fragmentation, TCP Flag, and other Packet Features fornetwork security devices, protocol analysis, signaling analysis, and traffic monitoring
Load Balance
Supported load balance Hash algorithm and session-based weight sharing algorithm according to L2-L7 layer characteristics to ensure that the port output traffic dynamic of load balancing
VLAN Tagged
VLAN Untagged
VLAN Replaced
Supported the matching of any key field in the first 128 bytes of a packet. The user can customize the offset value and key field length and content, and determine the traffic output policy according to the user configuration.
Single Fiber Transmission
Support single-fiber transmission at port rates of 10 G, 40 G, and 100 G to meet the single-fiber data receiving requirements of some back-end devices and reduce the input cost of fiber auxiliary materials when a large number of links need to be captured and distributed
Port Breakout
Supported 40G/100G port breakout function and can be split into four 10GE/25GE ports to meet specific access requirements
Time Stamping
Supported to synchronize the NTP server to correct the time and write the message into the packet in the form of a relative time tag with a timestamp mark at the end of the frame, with the accuracy of nanoseconds
Tunnel Encapsulation Stripping
Supported the VxLAN, VLAN, GRE, GTP, MPLS, IPIP header stripped in the original data packet and forwarded output.
Data/Packet De-duplication
Supported port-based or policy-level statistical granularity to compare multiple collection source data and repeats of same data packet at a specified time. Users can choose different packet identifiers (dst.ip, src.port, dst.port, tcp.seq, tcp.ack)
Data/Packet Slicing
Supported policy-based slicing (64-1518 bytes optional) of the raw data, and the traffic output policy can be implemented based on user configuration
Classified Date Masking
Supported policy-based granularity to replace any key field in the raw data in order to achieve the purpose of shielding sensitive information. According to user configuration, the traffic output policy can be implemented. Please visit "What’s the Data Masking Technology and Solution in Network Packet Broker?" for more details.
Tunneling Protocol Identification
Supported automatically identify various tunneling protocols such as GTP / GRE / PPTP / L2TP / PPPOE/IPIP. According to the user configuration, the traffic output strategy can be implemented according to the inner or outer layer of the tunnel
APP Layer Protocol Identify
Supported commonly used application layer protocol identification, such as FTP, HTTP, POP, SMTP, DNS, NTP, BitTorrent, S og, MySQL, MsSQL and so on
Video Traffic Filtering
Supported to filter and mitigate the video stream data matching such as domain name address resolution, video transmission protocol, URL and video format, to offer useful data to analyzers and monitors for security.
SSL Decryption
Supported loading the corresponding SSL certificate decryption. After the decryption of HTTPS encrypted data for the specified traffic, it will be forwarded to the back-end monitoring and analysis systems as required.
User-defined Decapsulation
Supported the user-defined packet decapsulation function, which can strip any encapsulated fields and contents in the first 128 bytes of a packet and output them
Packet Capturing
Supported real-time packet capture at the port and policy levels. When abnormal network data packets or abnormal traffic fluctuations occur, you can capture original data packets on the suspicious link or policy and download them to the local PC. Then you can use the Wireshark to quickly locate the fault.
Traffic Monitoring and Detection
Traffic monitoring provides real-time traffic situation monitoring capability. Traffic detection enables in-depth analysis of traffic data at different network locations, providing original data sources for real-time fault location
Network Traffic Insights
Supported visualization of the entire process of link data traffic from receiving, collecting, identifying, processing, scheduling, and output allocation. Through the friendly graphic and text interactive interface, multi-vision and multi-latitude display of traffic composition structure, traffic distribution on the whole network, packet identification and processing process status, traffic trends, and the relationship between traffic and time or business, transforming invisible data signals into visible, manageable and controllable entities.
Traffic Trend Alarming
Supported port-level, policy-level data traffic monitoring alarms by setting the alarm thresholds for each port and each policy flow overflow.
Historical Traffic Trend Review
Supported port-level, policy-level nearly 2 months of historical traffic statistics query. According to the days, hours, minutes and other granularity on the TX/RX rate, TX/RX bytes, TX/RX messages, TX/RX error number or other information to query select.
Real-time Traffic Detection
Supported the sources of "Capture Physical Port (Data Acquisition)", "Message Feature Description Field (L2 – L7)", and other information to define flexible traffic filter, for real-time capture network data traffic of different position detection, and will it will be storaged the real-time data after captured and detected in the device for downloading of further execution expert analysis or uses its diagnosis features of this equipment for deep visualization analysis.
DPI Packet Analysis
DPI in-depth analysis module of the traffic visualization detection function can conduct in-depth analysis of the captured target traffic data from multiple dimensions, and perform detailed statistical display in the form of graphs and tables Supported the captured datagram analysis, including abnormal datagram analysis, stream recombination, transmission path analysis, and abnormal stream analysis
Payment Terms: | TT/LC/DP/DA |
---|---|