Infrastructure TAP's and the need for a comprehensive network visibility system! (by Gabriel Guriencu)

Infrastructure TAP's and the need for a comprehensive visibility system

In order to achieve a 100% guaranteed view of all network traffic and fulfil today’s access and visibility requirements, the network infrastructure must incorporate network TAPs (Test Access Points).  Network Visibility solutions are only as good as the data that they receive; Network TAPs represent the foundation of an effective and reliable visibility infrastructure.  The question that follows is, naturally, what exactly is a Network TAP and what does it offer that makes it a more effective data source than alternatives such as Port Mirroring and SPAN (Cisco’s Switched Port Analyzer)?

Tim O’Neill, the technology consultant and Chief Contributing Editor of lovemytool.com has published an in-depth article comparing and contrasting the differences between a SPAN port and a Network TAP; the article can be found here: http://www.lovemytool.com/blog/2007/08/span-ports-or-t.html. In this article, Tim provides compelling reasons to use Network TAPs for meeting today’s network visibility requirements.  I will briefly point out below some of the key advantages a Network TAP has over a Port Mirroring or SPAN technology (I will use the term SPAN to generically describe these technologies for the rest of the paper) without reiterating everything the article states, and I highly encourage you to read it.

What is a Network TAP?

 If you cannot see your Network data, than how will you know if you have a problem or breach?

Continue reading "Infrastructure TAP's and the need for a comprehensive network visibility system! (by Gabriel Guriencu)" »


Layer 1 Troubleshooting Scenario (by Tony Fortunato)

In this article I wanted to review a current troubleshooting scenario that I thought you would benefit from.  The point of the article is that you should never overlook the basics.

While working onsite, I overheard a group of technicians discussing a current issue with a WiFi radio on a tower. Their management system reported that the radio was down and probably had to be replaced. One of the issues is that they have to get a hold of someone to climb the tower which means that the outage only gets longer. After they located someone I asked what was going on.

The senior analyst explained that his happens every so often and the radio just needs to be replaced with a new one.  I then asked if they would mind showing me around since we were just waiting for the contractor and they said no problem.

We walked over to the bottom of the tower, opened the enclosure and noticed that smell of burnt popcorn. There obviously wasn’t any popcorn there, that’s just my way of describing the smell of burnt cable or electronics. After some poking around, I determined that they needed to replace a lot more than just the radio.  In the video, I explain what I looked for, what I found and what I suggested. 

While waiting for the contractor, i also suggested that we review their grounding.

 

Continue reading other LoveMyTool posts by Tony Fortunato »


SharkFest US ’18 - The 20th anniversary of Wireshark! A recap by the ProfiTAP Team!  (by Rick Van Werven)

SharkFest US ’18 recap from the eyes of a Very Happy Sponsor!  

Another SharkFest has ended and, long story short, it was a great success!

The 11th annual SharkFest 2018 Wireshark Developer and User Conference took place at the Computer History Museum in Mountain View, CA, between June 25 - 28.

This year it also celebrated 20 years of Wireshark, the most popular open source packet analyzer that is used world wide by millions (probably Billions) of network, performance and security analysts and data technologists.

 Congratulations Gerald Combs,  the Wireshark Developers and Wireshark World Team!

Gerald Combs - Founder of Wireshark with long time Sharkfest instructor and

WWW.Lovemytool.com author Chris Greer

Gerald and chris

IMG_2850

Happy Birthday Wireshark from the Profitap team -

SharkfestÁngel Luis Flórez Parra (left) and Geoffrey Kempenich (Right) of ProfiTAP with Wired "shark"

 SharkFest is a great event for Profitap and other vendors to attend as a sponsor, because of the unique chance to get feedback from the Top Technologists, Wireshark developers and Real World users.

This year ProfiTAP focused on solutions that when combined with Wireshark can forge Packet Analysis Heroes.  Network Heroes Favorite Capture Tool Solution at SharkFest’18 US

Network Heroes Banner

Read and see more of Sharkfest 2018 - The 20th anniversary of Wireshark!

 

Continue reading "SharkFest US ’18 - The 20th anniversary of Wireshark! A recap by the ProfiTAP Team!  (by Rick Van Werven)" »


Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)

Diffusing The IT Blame Game With Network Visibility

How well does your company communicate internally? Specifically, how well do your IT departments communicate with each other?  Enterprises typically contain four or more IT sub departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it’s quite common for them to be at odds with each other, even in good times. For instance, there’s often contention over capital budgets, sharing resources, and headcount.

But let’s be generous. Let’s say that in normal operations things are usually good between departments. What happens if there’s a breach though, even a minor one? Then things can change quickly. Especially if there are problems with acquiring accurate monitoring data for security and troubleshooting areas. Finger pointing can quickly result.

So, what can you do? We recently discussed this on an LMTV podcast How To Diffuse The IT Blame Game. One of the answers is to create complete network visibility for network security and network monitoring and troubleshooting activities.

For instance, here are three common sources of issues for most IT organizations:

  • There is a lack of proper access to network data
  • Analytic and security tools can be modified, moved, or just plain disappear without permission
  • Capture and analysis of monitoring data can create business risk and problems for other departments

Lack of data access is self-explanatory; you just don’t have access to the data you need, when you need it. One reason is that if you need to make changes to the network, you typically need to get permission from the company Change Board (your network oversight governance organization). This usually takes days, maybe weeks depending upon the business.

Besides Change Board approval being an issue for connecting equipment to the network, this is also a common issue for SPAN port filter configurations as well. Any change to the network routing switch could potentially create a service impact. SPAN ports also constantly need reprogramming to capture new data. This could affect others using that particular filter and cause an unknown loss of data to the security and monitoring tools currently in use. The IT engineer may or may not know that the new filter is clipping important data – until there’s a problem, and someone gets blamed.

A second issue is that you may not have the budget you need for certain types of equipment. Even if other departments have the equipment, they often don’t want to share. Sharing is often a problematic issue for IT departments because the security and monitoring tools often get moved or reconfigured which causes irritation among staff members. Besides individual tool sharing, some enterprises have created “crash carts” that have a set of common diagnostic tools for immediate troubleshooting purposes. However, these crash carts and their tools are often not reset to default settings, which means that the next user has to waste time resetting and reconfiguring the equipment. This stress is heightened if there is an event, such as a security breach, network failure, or application failure. These incidences result in troubleshooting time delays, higher costs, and SLA/QoE problems. This is true even if the sharing problem turns out to be that monitoring data filters were changed without permission, as this itself can cause network and application outages or increase mean time to repair (MTTR).

A third common issue is that the capture of the data leads to other problems. For instance, encrypted data can be captured, decrypted, and then the data passed in the clear to monitoring analysis and storage devices. This is a good and necessary thing – you want and need to be able to analyze the data. Unfortunately, the other side of the coin is that this can, depending on what you do with that data and where it goes, cause regulatory compliance issues. Several standards, like PCI DSS and HIPAA, require that data in motion and data at rest be secured. In addition, should this clear text data be captured as part of a network breach, you have just increased your company’s financial liability.

As mentioned earlier, one of the biggest challenges for IT staff today is to get the proper network information they need, when they need it, so that they can make informed decisions about network security and problem resolution. Proper network visibility is the solution. Without this visibility, how do you know that you haven’t been breached? If you have been breached, what was affected? IT professionals know they cannot prevent all attacks, so they need to focus on quickly detecting signs of infiltration. This helps all IT departments avoid becoming the victim of the blame game. No one wins in the blame game.

But what can you really do about the problems. Here are some examples of how you can increase network visibility and eliminate some of the pitfalls:

  • Add taps to replace SPAN ports. Taps are set and forget technology which means that you only need to get Change Board approval one time to insert the tap and you are done.
  • Add a network packet broker (NPB) to eliminate most of the other Change Board approvals and eliminate crash carts. The NPB is situated after the tap so you can perform data filtering and distribution whenever you want. By implementing a tap and NPB approach, you may be able to reduce your MTTR times by up to 80%.
  • Add an NPB to perform data filtering. The NPB performs data filtering to send the right data to the right tool whenever you need it. This improves data integrity to the tools and improves time to data acquisition.
  • Add an NPB to create role-based access to filters. This eliminates the “who changed my settings” issue and allows multiple departments to share the same NPB.
  • Add virtual taps to get access to the often hidden East-West data in a virtual data center or cloud network

No one wins at the blame game as it’s a zero sum game. Even if one department appears to win, the whole group typically loses. One of the best things an IT department can do is increase network visibility because it gets at the core of the issue instead of treating symptoms. This is what will help reduce incidents, reduce long term costs, reduce troubleshooting times, and increase staff happiness.

If you want more information on this topic or network visibility solutions, check out the video podcast How To Diffuse The IT Blame Game and the ebook The Definitive Guide to Network Visibility Use Cases.

KeithAuthor: Keith Bromley is a senior product marketing manager for Keysight Technologies with more than 20 years of industry experience in marketing and engineering. Keith is responsible for marketing activities for Keysight's network monitoring switch solutions. As a spokesperson for the industry, Keith is a subject matter expert on network monitoring, management systems, unified communications, IP telephony, SIP, wireless and wireline infrastructure. Keith joined Ixia in 2013 and has written many industry whitepapers covering topics on network monitoring, network visibility, IP telephony drivers, SIP, unified communications, as well as discussions around ROI and TCO for IP solutions. Prior to Keysight, Keith worked for several national and international Hi-Tech companies including NEC, ShoreTel, DSC, Metro-Optix, Cisco Systems and Ericsson, for whom he was industry liaison to several technical standards bodies. He holds a Bachelor of Science in Electrical Engineering.

Oldcommguy dubs Keith "One Of The Good Guys" in today's technology!

Please note - Keith has many other popular articles on WWW.Lovemytool.com - and on Keysight Technologies.

Top-five-ways-to-strengthen-a-security-architecture

How-to-improve-compliance-activities

Some-easy-ways-to-improve-network-troubleshooting

How-to-improve-network-security-and-performance

A-life-cycle-view-of-network-security

What-the-heck-are-network-blind-spots?

Network-monitoring-basics-what-why-how?

Network-security-resilience-report!

Network-monitoring-basics-what-why-how!

What-applications-are-flowing-over-your-network?

Find-breaches-faster-using-indicators-of-compromise-by-keith-bromley.html

Understanding-network-visibility-use-cases-by-keith-bromley.html


Testing POE with Pockethernet (by Tony Fortunato)

Its important for analysts to have basic tool to test their equipment and cables.

The other day I needed to replace a POE injector on a roof and wanted to make sure that the one I found in my box of goodies actually works.

I’ve been in many situations where the equipment or cables I find in a box is there because it doesn’t work.

So I used me pockethernet (www.pockethernet.com) to test the link, poe and network connectivity and thought I would share.

Having layer 1 test tools is not optional for me since I cant tell you how many issues I resolved that were at layer one.

Continue reading "Testing POE with Pockethernet (by Tony Fortunato)" »