SlideShare a Scribd company logo
A new perspective on NETWORK VISIBILITY
- 10th RiSK Conference, LaĹĄko, Slovenia -
Siniša Popović
Regional Sales Manager
11-12th March 2015
Net Optics –
acquired by Ixia
but... NetOptics will still remain as a brand name!
About Net Optics
• Founded in 1996.
• HQ: Silicon Valley, USA
• Offices: Germany, Netherlands, Australia, China
• Manufacured industry 1st TAP ever!
• 7.500+ global deployments
• 20+ patents
• 85% of fortune 100
Awards
Media
Net Optics –
acquired by Ixia
but... NetOptics will still remain as a brand name!
About Net Optics
• Founded in 1996.
• HQ: Silicon Valley, USA
• Offices: Germany, Netherlands, Australia, China
• Manufacured industry 1st TAP ever!
• 7.500+ global deployments
• 20+ patents
• 85% of fortune 100
Awards
Media
Service Providers trust IXIA to:
 Improve and speed service delivery
 Speed roll out of next gen services
 Improve network and application visibility
and performance
Equipment Manufacturers trust IXIA to:
 Develop next generation devices
 Speed time to market
 Improve performance and reliability
Enterprises trust IXIA to:
 Assess vendor equipment and applications
 Improve network security posture
 Improve network and application visibility
and performance
Chip Fabricators trust IXIA to:
 Validate protocol conformance
 Speed time to market
Test
Security
Visibility
The MOST TRUSTED names
in networking trust
Today’s Challenges
Network growing faster than tools!
0% 10% 20% 30% 40% 50%
100M
1G
10G
40G
100G
Current Planned in 12 months
* by EMA research
Maximum networking link speeds within data center / core networks
Threats are growing
Important factor: Network
Performance!
Growing number of tools
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Traditional access methods don‘t
work!
1. Dropping packets
2. High switch CPU and memory load
3. Doesn‘t forward L1/L2 errors
4. Needs to be configured
5. Mixing source/destination information
6. Limited number of SPAN ports
7. Compliance issues!!!
8. Distorts packet arrival times
SPAN port
Step 1: use Network TAP instead of
SPAN
Benefits
• 100% visibility, no dropped packets
• Doesn’t affect switch CPU and memory
• Plug-and-play — no configuration required
• Permanent access: no need to break the link each
time you need to remove tool
• Forwards important L1 and L2 errors
• Dual power supplies: keeps the network link up
and running in case of power failure
• Doesn’t change packet arrival times
SwitchFirewall
Analyzer
Switch
SPAN or TAP?
New challenge: amount of traffic is
growing!
Walmart collects over 1 million transactions every hour. This
data is streamed into massive data stores currently containing
over 2.5 petabytes of data.
Result: Tools are OVERSUBSCRIBED
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Where are the blind spots created?
ESX Stack
Hypervisor
Phantom
Monitor™
V Switch
vm 1 Vm 2 Vm 3
Director
Aggregation
Visibility Architecture
Advanced Packet Distribution
Aggregation and regeneration
Intelligent Filtering
Bypass switching
Packet Slicing & DeDuplication
Total Network Visibility
Ixia – Portfolio
Net Tool OptimizerÂŽ
Network
Visibility
Solutions
Network TAPs Copper and fiber TAPs for passive network access
Bypass Switches Copper and fiber switches for secure inline access
Network Packet Brokers
Intelligent data access with aggregation, filtering,
load balancing, de-duplication and more
Virtualization TAPs Get the full visibility into virtual networks
GTP Session Controller
Intelligent distribution and control of
mobile network traffic
Intelligent data access
Network Packet Brokers
Intelligent Traffic Distribution
− Aggregation of traffic from multiple links
− Filtering (by IP, MAC, VLAN, Port, etc.)
− Load-balancing traffic across tools
− Replication of traffic to multiple tools
Network Packet Brokers
Intelligent Packet Processing
− Header stripping (MPLS, VLAN, ...)
− Time-stamping with nano-second precision
− De-duplication for removing duplicated packets
− Packet slicing for removing unnecessary payload
Aggregation
• Problem: too many network links/segments, expensive to
deploy
• Solution: aggregate multiple inputs into few outputs
10 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps
1 Gbps1 Gbps
Intelligent Filtering
TCP
Filter
HTTP
Filter
192.0.0.5
Filter
SNMP
Filter
Complex filter
Network Port 1 Monitor Port 5Source IP =
192.168.10.1
Network Port 3
Monitor Port 6
Protocol=
UDP
Monitor Port 8
Network Port 6
Source IP =
192.168.10.1
Protocol =
TCP
Layer 4
Port = 80
Monitor Port 2
Multilayer filtering
Simple filter
IDS DAM
Filtering example
Internet
Web Web App EmailFile File File File
Internet
File Security
Web Security
Email Security
Data Center DMZ
Filter only File
Server traffic Filter only WEB
Server traffic
Filter only
Email traffic
10G 10G
Load Balancing
LB Group 2LB Group 1
Switch
IPS 1
Firewall Router
IPS 2 IPS 3 IPS 4 IPS 5 IPS 6
1G 1G 1G 1G 1G 1G
• Sharing 10G link to many 1G tools
• Link can be tapped with a bypass
switch for additional protection
De-duplication
2 3 4 5 6 7 8 9
input
packets
duplicated
packets
1
21 3 4 5output
packets
= 9 * 1580 bytes = 14220 bytes
= 5 * 1580 bytes = 7900 bytes
55% traffic reduction
Packet Slicing
Problem:
In many cases only the header is needed for analyzing. Forwarding a 1500byte packet to a probe does consume more
memory at the disk than a 64byte packet. If the data content is not needed this would be wasting recourses beside that it
does consume bandwidth on the downlink to the probe.
Solution:
A Network Monitoring Switch does remove the data content of a packet before the packet will be forwarded to the probe.
The user can define by the GUI what header information will retrain after trimming.
MAC IP Data FCS
MAC IP FCS
Port tagging
Network Scenarios
DMZ Segment
Database Farm
Tag 1
Tag 3
Tag 2
Server Array
Problem:
When aggregating packets over multiple TAPs, it’s no more
possible to identify from which TAP they have been
originally taken. Measuring the delay e.g. through a
Firewall would result in the need of an additional probe.
This is costly.
Solution:
By adding a Port TAG to the packet, the Network
Monitoring Switch provides full visibility again and for the
Firewall example one probe would last.
Timestamping for precise
measurements
The first four bytes of the timestamp are a 32-bit binary value in seconds.
The second four bytes are a 32-bit binary value representing tenths of microseconds;
The final four bytes are reserved for use when higher-precision timestamping becomes available,
making the timestamp format capable of supporting a resolution of 0.1 picoseconds.
Tap and optimize virtual traffic
„Phantom Virtual Tap enables 100% visibility
of east-west, inter-VM, and blade server
mid-plane traffic, with ability to do
aggregation, replication and multilayer L2-L4
filtering inside the virtual environment.”Best throughput results
Extensive L2-L4 Filtering
Minimal resources used
Virtual and Physical convergence
ES
X
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantom™
Manager
KV
M
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantom™
Manager
XE
N
App
OS
VM1
Hypervisor
App
OS
VM2
App
OS
VM2
V Switch
Phantom™
Manager
Tunnel
IDS
NGFW Protocol
Analyzer
DLP
Net Optics Director™
Net Optics Phantom™ HD
Physical Server
Physical Server
LAN/WAN
Without Visibility Architecture
Performance Security Visibility
Good packets
Duplicated packets
Un-filtered packets
Large packets
With Visibility Architecture
Performance Security Visibility
Good packets
Dupl. packets
Ixia
NetOptics
Filter. packets
Carrier Networks
Wired and Mobile
Data Center
Private Cloud
Virtualization
Core
Remote Office
Branch Office
Campus
Network
Operations
Performance
Management
Security
Admin
Server Admin
Audit &
Privacy
Forensics
Visibility Architecture
App
Aware
Out of
Band
NPB
Network
Taps
Element
Mgmt
Virtual
& Cloud
Access
Policy
Mgmt
Inline
NPBInline
Bypass
Session
Aware
Data Center
Automation
Network
Access
Packet
Brokers
Applications Management
www.ixiacom.com/solutions/network-visibility/
www.netoptics.com | www.network-taps.eu
The End
Thank you!
Siniša Popović
Regional Sales Manager
E: sinisa.popovic@np-channel.com
T: +43 676 793 4000

More Related Content

What's hot

MQTT + DASH7 Integration
MQTT + DASH7 IntegrationMQTT + DASH7 Integration
MQTT + DASH7 Integration
Haystack Technologies
 
pps Matters
pps Matterspps Matters
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
Jisc
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
Jisc
 
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet MethodologiesAn Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
rAVe [PUBS]
 
Open stackdaykorea2016 wedge
Open stackdaykorea2016 wedgeOpen stackdaykorea2016 wedge
Open stackdaykorea2016 wedge
Junho Suh
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
ULLPTT
 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
Olivier Bonaventure
 
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of view
brouer
 
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
Julien Vermillard
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
KHNOG
 
How To Triple The Range of LoRa
How To Triple The Range of LoRaHow To Triple The Range of LoRa
How To Triple The Range of LoRa
Haystack Technologies
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44
Jisc
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Open Networking Summit
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
openflow
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and Californium
Julien Vermillard
 
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
PROIDEA
 

What's hot (20)

MQTT + DASH7 Integration
MQTT + DASH7 IntegrationMQTT + DASH7 Integration
MQTT + DASH7 Integration
 
pps Matters
pps Matterspps Matters
pps Matters
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet MethodologiesAn Introduction and Comparison of Dante, AVB and CobraNet Methodologies
An Introduction and Comparison of Dante, AVB and CobraNet Methodologies
 
Open stackdaykorea2016 wedge
Open stackdaykorea2016 wedgeOpen stackdaykorea2016 wedge
Open stackdaykorea2016 wedge
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Innovation is back in the transport and network layers
Innovation is back in the transport and network layersInnovation is back in the transport and network layers
Innovation is back in the transport and network layers
 
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
 
Challenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of viewChallenges and experiences with IPTV from a network point of view
Challenges and experiences with IPTV from a network point of view
 
Netflow slides
Netflow slidesNetflow slides
Netflow slides
 
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
M2M, IoT, Device management: one protocol to rule them all? - EclipseCon 2014
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
 
How To Triple The Range of LoRa
How To Triple The Range of LoRaHow To Triple The Range of LoRa
How To Triple The Range of LoRa
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and Californium
 
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
PLNOG 17 - Marcin Aronowski - Technologie dostępowe dla IoT. Jak się w tym ws...
 

Similar to A new perspective on Network Visibility - RISK 2015

Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
Denny K
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET Journal
 
IOT and System Platform From Concepts to Code
IOT and System Platform From Concepts to CodeIOT and System Platform From Concepts to Code
IOT and System Platform From Concepts to Code
Andy Robinson
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
rAVe [PUBS]
 
ADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptxADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptx
CADALTAINGENIERIASRL
 
Future Internet protocols
Future Internet protocolsFuture Internet protocols
Future Internet protocols
Olivier Bonaventure
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
ElmarkPlusTurkiye
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
Ja-seop Kwak
 
RGNet Ver.1.0.pptx
RGNet Ver.1.0.pptxRGNet Ver.1.0.pptx
RGNet Ver.1.0.pptx
VeenitTomar2
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
Redge Technologies
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
confluent
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oem
blabadini
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
ThomasGraf40
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
DATA SECURITY SOLUTIONS
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
ULLPTT
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
FRSecure
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptx
Prakash Singh
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
Farzad Soltani
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
Shuya Osaki
 

Similar to A new perspective on Network Visibility - RISK 2015 (20)

Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
IOT and System Platform From Concepts to Code
IOT and System Platform From Concepts to CodeIOT and System Platform From Concepts to Code
IOT and System Platform From Concepts to Code
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
ADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptxADAM-3600 Sales kit_WATER.pptx
ADAM-3600 Sales kit_WATER.pptx
 
Future Internet protocols
Future Internet protocolsFuture Internet protocols
Future Internet protocols
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
OpenFlow Tutorial
OpenFlow TutorialOpenFlow Tutorial
OpenFlow Tutorial
 
RGNet Ver.1.0.pptx
RGNet Ver.1.0.pptxRGNet Ver.1.0.pptx
RGNet Ver.1.0.pptx
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
Continuum pcap-oem
Continuum pcap-oemContinuum pcap-oem
Continuum pcap-oem
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptx
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

A new perspective on Network Visibility - RISK 2015

  • 1. A new perspective on NETWORK VISIBILITY - 10th RiSK Conference, LaĹĄko, Slovenia - SiniĹĄa Popović Regional Sales Manager 11-12th March 2015
  • 2. Net Optics – acquired by Ixia but... NetOptics will still remain as a brand name!
  • 3. About Net Optics • Founded in 1996. • HQ: Silicon Valley, USA • Offices: Germany, Netherlands, Australia, China • Manufacured industry 1st TAP ever! • 7.500+ global deployments • 20+ patents • 85% of fortune 100 Awards Media
  • 4. Net Optics – acquired by Ixia but... NetOptics will still remain as a brand name!
  • 5. About Net Optics • Founded in 1996. • HQ: Silicon Valley, USA • Offices: Germany, Netherlands, Australia, China • Manufacured industry 1st TAP ever! • 7.500+ global deployments • 20+ patents • 85% of fortune 100 Awards Media
  • 6. Service Providers trust IXIA to:  Improve and speed service delivery  Speed roll out of next gen services  Improve network and application visibility and performance Equipment Manufacturers trust IXIA to:  Develop next generation devices  Speed time to market  Improve performance and reliability Enterprises trust IXIA to:  Assess vendor equipment and applications  Improve network security posture  Improve network and application visibility and performance Chip Fabricators trust IXIA to:  Validate protocol conformance  Speed time to market Test Security Visibility The MOST TRUSTED names in networking trust
  • 8. Network growing faster than tools! 0% 10% 20% 30% 40% 50% 100M 1G 10G 40G 100G Current Planned in 12 months * by EMA research Maximum networking link speeds within data center / core networks
  • 12. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3
  • 13. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3
  • 14. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3
  • 15. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3
  • 16. Traditional access methods don‘t work! 1. Dropping packets 2. High switch CPU and memory load 3. Doesn‘t forward L1/L2 errors 4. Needs to be configured 5. Mixing source/destination information 6. Limited number of SPAN ports 7. Compliance issues!!! 8. Distorts packet arrival times SPAN port
  • 17. Step 1: use Network TAP instead of SPAN Benefits • 100% visibility, no dropped packets • Doesn’t affect switch CPU and memory • Plug-and-play — no configuration required • Permanent access: no need to break the link each time you need to remove tool • Forwards important L1 and L2 errors • Dual power supplies: keeps the network link up and running in case of power failure • Doesn’t change packet arrival times SwitchFirewall Analyzer Switch
  • 19. New challenge: amount of traffic is growing! Walmart collects over 1 million transactions every hour. This data is streamed into massive data stores currently containing over 2.5 petabytes of data.
  • 20. Result: Tools are OVERSUBSCRIBED
  • 21. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3
  • 22. Where are the blind spots created? ESX Stack Hypervisor Phantom Monitor™ V Switch vm 1 Vm 2 Vm 3 Director Aggregation Visibility Architecture Advanced Packet Distribution Aggregation and regeneration Intelligent Filtering Bypass switching Packet Slicing & DeDuplication Total Network Visibility
  • 23. Ixia – Portfolio Net Tool OptimizerÂŽ Network Visibility Solutions Network TAPs Copper and fiber TAPs for passive network access Bypass Switches Copper and fiber switches for secure inline access Network Packet Brokers Intelligent data access with aggregation, filtering, load balancing, de-duplication and more Virtualization TAPs Get the full visibility into virtual networks GTP Session Controller Intelligent distribution and control of mobile network traffic
  • 24. Intelligent data access Network Packet Brokers Intelligent Traffic Distribution − Aggregation of traffic from multiple links − Filtering (by IP, MAC, VLAN, Port, etc.) − Load-balancing traffic across tools − Replication of traffic to multiple tools Network Packet Brokers Intelligent Packet Processing − Header stripping (MPLS, VLAN, ...) − Time-stamping with nano-second precision − De-duplication for removing duplicated packets − Packet slicing for removing unnecessary payload
  • 25. Aggregation • Problem: too many network links/segments, expensive to deploy • Solution: aggregate multiple inputs into few outputs 10 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps 1 Gbps1 Gbps
  • 26. Intelligent Filtering TCP Filter HTTP Filter 192.0.0.5 Filter SNMP Filter Complex filter Network Port 1 Monitor Port 5Source IP = 192.168.10.1 Network Port 3 Monitor Port 6 Protocol= UDP Monitor Port 8 Network Port 6 Source IP = 192.168.10.1 Protocol = TCP Layer 4 Port = 80 Monitor Port 2 Multilayer filtering Simple filter IDS DAM
  • 27. Filtering example Internet Web Web App EmailFile File File File Internet File Security Web Security Email Security Data Center DMZ Filter only File Server traffic Filter only WEB Server traffic Filter only Email traffic 10G 10G
  • 28. Load Balancing LB Group 2LB Group 1 Switch IPS 1 Firewall Router IPS 2 IPS 3 IPS 4 IPS 5 IPS 6 1G 1G 1G 1G 1G 1G • Sharing 10G link to many 1G tools • Link can be tapped with a bypass switch for additional protection
  • 29. De-duplication 2 3 4 5 6 7 8 9 input packets duplicated packets 1 21 3 4 5output packets = 9 * 1580 bytes = 14220 bytes = 5 * 1580 bytes = 7900 bytes 55% traffic reduction
  • 30. Packet Slicing Problem: In many cases only the header is needed for analyzing. Forwarding a 1500byte packet to a probe does consume more memory at the disk than a 64byte packet. If the data content is not needed this would be wasting recourses beside that it does consume bandwidth on the downlink to the probe. Solution: A Network Monitoring Switch does remove the data content of a packet before the packet will be forwarded to the probe. The user can define by the GUI what header information will retrain after trimming. MAC IP Data FCS MAC IP FCS
  • 31. Port tagging Network Scenarios DMZ Segment Database Farm Tag 1 Tag 3 Tag 2 Server Array Problem: When aggregating packets over multiple TAPs, it’s no more possible to identify from which TAP they have been originally taken. Measuring the delay e.g. through a Firewall would result in the need of an additional probe. This is costly. Solution: By adding a Port TAG to the packet, the Network Monitoring Switch provides full visibility again and for the Firewall example one probe would last.
  • 32. Timestamping for precise measurements The first four bytes of the timestamp are a 32-bit binary value in seconds. The second four bytes are a 32-bit binary value representing tenths of microseconds; The final four bytes are reserved for use when higher-precision timestamping becomes available, making the timestamp format capable of supporting a resolution of 0.1 picoseconds.
  • 33. Tap and optimize virtual traffic „Phantom Virtual Tap enables 100% visibility of east-west, inter-VM, and blade server mid-plane traffic, with ability to do aggregation, replication and multilayer L2-L4 filtering inside the virtual environment.”Best throughput results Extensive L2-L4 Filtering Minimal resources used
  • 34. Virtual and Physical convergence ES X App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager KV M App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager XE N App OS VM1 Hypervisor App OS VM2 App OS VM2 V Switch Phantom™ Manager Tunnel IDS NGFW Protocol Analyzer DLP Net Optics Director™ Net Optics Phantom™ HD Physical Server Physical Server LAN/WAN
  • 35. Without Visibility Architecture Performance Security Visibility Good packets Duplicated packets Un-filtered packets Large packets
  • 36. With Visibility Architecture Performance Security Visibility Good packets Dupl. packets Ixia NetOptics Filter. packets
  • 37. Carrier Networks Wired and Mobile Data Center Private Cloud Virtualization Core Remote Office Branch Office Campus Network Operations Performance Management Security Admin Server Admin Audit & Privacy Forensics Visibility Architecture App Aware Out of Band NPB Network Taps Element Mgmt Virtual & Cloud Access Policy Mgmt Inline NPBInline Bypass Session Aware Data Center Automation Network Access Packet Brokers Applications Management www.ixiacom.com/solutions/network-visibility/ www.netoptics.com | www.network-taps.eu
  • 38. The End Thank you! SiniĹĄa Popović Regional Sales Manager E: sinisa.popovic@np-channel.com T: +43 676 793 4000