DPI Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP

Brand Name:NetTAP®
Certification:CCC, CE, RoHS
Model Number:NT-FTAP-48XE
Minimum Order Quantity:1 SET
Delivery Time:1-3 Working Days
Payment Terms:L/C, D/A, D/P, T/T, Western Union, MoneyGram
Contact Now

Add to Cart

Verified Supplier
Location: Chengdu Sichuan China
Address: 2F, G4 of TianFu Software Park, Chengdu, China.
Supplier`s last login times: within 23 hours
Product Details Company Profile
Product Details

Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP


With network communication technology progress and development, network communication has entered the era of big data, how to monitor all kinds of business system of communication data transmission quality in the large data flow, and the category of vast amounts of network traffic data exists in the small amount of malicious traffic detection, avoid malicious communications for hosts, network devices, the root of security threats, and the communication content theft.Is the network management must face a difficult problem.


It is the law of nature that there is a spear to attack and a shield to defend itself.With the advent of big data, traditional real-time detection and defense are no longer capable of identifying subtle anomalies in massive data.Therefore, the real-time backup of original communication data gradually shows its necessity, and the backtracking analysis technology based on time window to detect the depth of packets is the microscope to find abnormal data.


Introduction to DPI technology


DPI(Deep Packet Inspection) technology is based on the traditional IP Packet Inspection technology (detection and analysis of Packet elements contained between OSI l2-l4), which adds application protocol recognition, Packet content detection and depth decoding of application layer data. Deep Packet Inspection (DPI) is also a sophisticated network packet filtering technique used to analyze the contents of data packets as they pass through a network. Unlike traditional packet filtering, which only examines the header information, DPI inspects the payloads of packets to gather detailed information about the data being transmitted.


By capturing the original packets of network communication, DPI technology can use three kinds of detection methods: "eigenvalue" detection based on application data, recognition detection based on application layer protocol, and data detection based on behavior pattern.According to different detection methods, unpack and analyze the abnormal data that may be contained in the communication packet one by one to dig out the subtle data changes in the macro data flow.


DPI supports the following applications:

• the ability to manage traffic, or control end-user applications such as point-to-point applications

• security, resources, and licensing control

• policy enforcement and service enhancements, such as personalization of content or content filtering

The benefits include increased visibility into network traffic, which allows network operators to understand usage patterns and link network performance information to providing usage base billing and even acceptable usage monitoring.

DPI can also reduce the overall cost of the network by reducing operating expenses (OpEx) and capital expenditures (CapEx) by providing a more complete picture of how the network is operating and the ability to direct or intelligently prioritize traffic.

Cybersecurity: Used for threat detection, intrusion prevention systems (IPS), and monitoring for data breaches.
Traffic Management: ISPs and organizations use DPI to manage bandwidth and enforce quality of service (QoS) policies.
Compliance: Ensures adherence to legal and regulatory requirements by monitoring sensitive data flows.


Deep Packet Inspection(DPI) in VPN Virtual Private Network Application

VPN is a remote access technology, which simply means using public network to set up private network.For example, if an employee of a company is on a business trip and wants to access server resources on the Intranet, such access is remote.

In the traditional enterprise network configuration, to carry out remote access, the traditional method is to rent DDN (digital data network) line or frame relay, such a communication scheme will inevitably lead to high network communication and maintenance costs.For mobile users (mobile office workers) and remote individual users, generally through the dial-up line (Internet) access to the enterprise's LAN, but this will inevitably bring security risks.

Let the non-local staff access to the Intranet resources, the use of VPN solution is to set up a VPN server in the Intranet.After connecting to the Internet locally, the non-local employees connect to the VPN server through the Internet, and then access the enterprise Intranet through the VPN server.In order to ensure data security, the communication data between VPN server and client is encrypted.With data encryption, can think the data is in a special secure transmission of data link, like specially set up a private network, but is actually a public link VPN are using the Internet, so called VPN virtual private network, its essence is to use encryption technology in public encapsulation out a data communications channel.With VPN technology, users can use VPN to access internal network resources as long as they have access to the Internet, no matter they are traveling or working at home. This is why VPN is so widely used in enterprises.


Recommend Network Packet Broker for Deep Packet Inspection VPN by Network Visibility Software Tools



Network Packet Broker Specifications


NT-FTAP-48XE NetTAP® NPB Functional Parameters
Network Interface10GE SFP+ ports48 * SFP+ slots; support 10GE/GE; support for single and multi-mode fiber
Out of Band management interface1* 10/100/1000M electrical interface;
Deployment mode10Gigabit spectral captureSupport 24*10GE bidirectional fiber links capture
10Gigabit Mirror span capture

Support up to 48 mirror span traffic ingress


Optical Splitter inputInput port can support single-fiber ingress;
Port multiplexingSupport input ports simultaneously as output ports;
Traffic outputSupport 48 *10GE ports traffic output;
Traffic replication / aggregation / distributionsupport
Link QTYs supporting Mirror replication / aggregation

1 -> N link traffic replication (N <48)

N-> 1 link traffic aggregation (N <48)

G Group(M-> N Link) traffic replication and aggregation [G * (M + N) <48]

Distribution based on traffic identificationsupport
Distribution based on IP / protocol / port Five tuple traffic identificationsupport
Distribution strategy based on protocol header the key labeled traffic identifiessupport
Ethernet encapsulation independencesupport
CONSOLE network managementsupport
IP/WEB network managementsupport
SNMP network managementsupport
TELNET/SSH network managementsupport
SYSLOG protocolsupport
User authentication function

Password authentication based on user name


Electric(1+1 Redundant Power System-RPS)Rated supply voltageAC110-240V/DC-48V [Optional]
Rated power frequencyAC-50HZ
Rated input currentAC-3A / DC-10A
Rated power function200W
EnvironmentOperating Temperature0-50℃
Storage Temperature-20-70℃
Operating Humidity10%-95%,Non-condensing
User ConfigurationConsole ConfigurationRS232 Interface,115200,8,N,1
Password authenticationsupport
Rack HeightRack space (U)1U 485mm*44.5mm*350mm

NT-FTAP-48XE Network TAP NPB.pdf


Plz contact NetTAP® directly to Optimize your Network now!

China DPI Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP supplier

DPI Deep Packet Inspection VPN by Network Visibility Software Tools of Network TAP

Inquiry Cart 0