ACL Access Control List Network Tap Device for Packet Capture as Wireshark

Brand Name:NetTAP®
Certification:CCC, CE, RoHS
Model Number:NT-FTAP-32QCX
Minimum Order Quantity:1 SET
Delivery Time:1-3 Working Days
Payment Terms:L/C, D/A, D/P, T/T, Western Union, MoneyGram
Contact Now

Add to Cart

Verified Supplier
Location: Chengdu Sichuan China
Address: 2F, G4 of TianFu Software Park, Chengdu, China.
Supplier`s last login times: within 23 hours
Product Details Company Profile
Product Details

Packet Capture Filter Network Packet Broker Based on ACL Access Control List as Wireshark


Packet Filtering Technology is the most common firewall technology. For a dangerous network, a filter router provides a way to block certain hosts and networks from connecting to the internal network, or it can be used to restrict internal access to some dangerous and pornographic sites.

Packet filtering technology, just as its name implies is the place for packet in the network have a choice, choose the basis, the filtering rules for the system (often known ACL as Access Control Lists, the Access Control List), only to meet the packet filtering rules is forwarded to the corresponding network interface, the rest of the packet is removed from the data stream.

Packet filtering can control site-to-site, site-to-network, and network-to-network access, but it cannot control the content of the data that is transmitted because the content is application-level data, not recognizable by the packet filtering system. Packet filtering allows you to provide special protection for the entire network in a single place.

The packet filter checking module penetrates between the network layer and the data link layer of the system.Because the data link layer is the DE facto network card (NIC) and the network layer is the first-layer protocol stack, the firewall is at the bottom of the software hierarchy.


Packet Filtering Through the inspection module, the firewall can intercept and check all outbound data.The firewall inspection module first verifies whether the packet conforms to the filtering rules. Regardless of whether the packet conforms to the filtering rules, the firewall shall record the packet situation, and the packet that does not conform to the rules shall alarm or notify the administrator.Depending on the packet filtering strategy, the firewall may or may not send a message to the sender for dropped packets.The packet checking module can check all the information in the packet, generally the IP header of the network layer and the header of the transport layer.Packet filtering generally checks for the following items:

IP source address;

IP destination address;

Protocol types (TCP packets, UDP packets and ICMP packets);

The source port of TCP or UDP;

The destination port of TCP or UDP;

ICMP message type;

The ACK bit in the TCP header.


Packet Filtering Function is often integrated into routers or Bridges to limit the flow of information.Packet filters enable administrators to control packets for specific protocols so that they can only be sent to local parts of the network.Ability to isolate E-mail domains;Able to perform other control functions on packet transmission.

Packet filter is an important function of firewall application. It checks the header of IP packet to determine the source address, destination address and network transmission service utilized by packet.Traditional packet filters are static, allowing or rejecting packets only according to the content of the packet header and the combination of rules.Intrusion detection systems use packet filtering and match data packets to predefined characteristics to analyze various packets and then warn of potential network hackers and intruders.

Packet filters are also a key tool in network sniffing, protocol analyzer, or packet analyzer.Many network sniffer tools have multiple filter types, thus enabling users to filter packets and see how they are being transmitted.


Access Control List (ACL) is an access control technology based on packet filtering, which can filter packets on the interface according to set conditions, allowing them to pass through or discard.Access control list is widely used in routers and three-layer switches. With the help of access control list, users can effectively control their access to the network, thus ensuring network security to the greatest extent.

Access Control Lists (ACLs) are Lists of instructions applied to the router interface.These instruction lists are used to tell the router which packets to accept and which to reject.Whether a packet is received or rejected can be determined by specific indications such as the source address, destination address, port number, and so on.

Access control lists have many functions, such as limiting network traffic and improving network performance;Control of traffic flow. For example, ACL can limit or simplify the length of routing update information, so as to limit traffic flow through a certain network segment of the router.Provide the basic means of network security access;Determine which type of traffic is forwarded or blocked at the router port. For example, users can allow E-mail traffic to be routed, deny all Telnet traffic, and so on.

Access control lists (acls) are not conceptually complex; what is more complicated is the configuration and use of them, and many beginners often make errors when using acls.

Function

1. Limit network traffic and improve network performance. For example, an ACL can specify that packets of this type have a higher priority, depending on the protocol of the packet, and can be processed in advance by the network device as such.

2. Provide control means for communication flow.

3. Provide basic security means for network access.

4. At the network device interface, decide which type of traffic is forwarded and which type of traffic is blocked.

For example, a user could allow E-mail traffic to be routed, denying all Telnet traffic.For example, if a department requires only the WWW function, it can be implemented through ACL.For example, an ACL can be used to implement a department that is not allowed to access the extranet or the extranet to access it for confidentiality reasons.


Application

Acls can be used in a variety of situations, the most common of which are as follows:

1. Filter the routing information transmitted between neighboring devices.

2. Control exchange access to prevent unauthorized access to the device, such as Console interface, Telnet or SSH access.

3. Control the flow of network equipment and network access.

4. Protect the router by restricting access to certain services on the router, such as HTP, SNMP and NIP.

5. Define streams of interest for DDR and IPSeC VPN.

6. Able to implement QoS(quality of service) features in IOS in a variety of ways.

7. Extended application in other security technologies, such as TCP interception and IOS firewall.


NT-FTAP-32QCX Network Packet Brokers(NPBs) Support the ACL(Access Control List) and Packet Filter function as Wireshark



NT-FTAP-32QCX NetTAP® Network TAP/NPB Functional Parameters
Network Interface100G(compatible with 40G)32*QSFP28 slots
Out band interface1*10/100/1000M cooper
Deploy modeFiber tapSupport
Mirror spanSupport
System functionTraffic processingTraffic replicating/aggregating/splittingSupport
Load-balancingSupport
Filter based on IP/protocol/port quintuple traffic identificationSupport
Access Control List(ACL)Support
UDF MatchingSupport
Single fiber transmissionSupport
Ethernet package independenceSupport
Processing ability3.2Tbps
ManagementCONSOLE MGTSupport
IP/WEB MGTSupport
SNMP MGTSupport
TELNET/SSH MGTSupport
SYSLOG ProtocolSupport
RADIUS or AAA Centralized authorizationSupport
User authenticationAuthentication based on username and password

Electrical

(1+1 Redundant Power System-RPS)

Rated power supply voltageAC110~240V/DC-48V[Optional]
Rated power frequencyAC-50HZ
Rated input currentAC-3A / DC-10A
Rated function powerMax 450W
EnvironmentOperating temperature0-50℃
Storage temperature-20-70℃
Working humidity10%-95%, No condensation
User ConfigurationConsole ConfigurationRS232 interface,115200,8,N,1
Password authenticationSupport
Chassis HeightRack Space (U)1U 445mm*44mm*505mm

NT-FTAP-32QCX Network TAP NPB.pdf

China ACL Access Control List Network Tap Device for Packet Capture as Wireshark supplier

ACL Access Control List Network Tap Device for Packet Capture as Wireshark

Inquiry Cart 0