8 posts categorized "TAPs" Feed

LMTV LIVE | How to Create Scalable Visibility in your Data Center (with Chris Bihary of Garland Technology)



YouTube LIVE event start time: Wednesday, July 19, 2017, 9:30 AM PST


Garland170x200How do you scale your network infrastructure to support multiple monitoring tools - while ensuring 100% packet capture?

This is the problem we have been hearing in the last few years. Data centers (D1 & D2) and enterprise networks have many challenges and two of the big ones are providing the IT department anytime access to full-duplex traffic, while guaranteeing full packet capture. Now layer on top of that a stack of 1G legacy monitoring tools in addition to the migration to 10G/40G and 100G speeds.

Join us for to learn about the latest visibility solution from Garland Technology’s as they introduce and demonstrate their Passive Fiber Modular Chassis System, a flexible, scalable and affordable high density solution for managing up to 24 links in a 1U box at network speeds of 1G/10G/40G/100G.


Click to read other LMTV posts by contributors of LoveMyTool »


Are My Packets Lying? – Four Things To Look For In Packet Traces (by Chris Greer)

Blog-Are my Packets Lying

Packets don’t lie – well, most of the time.

Packets will tell you the truth unless they have been captured incorrectly. In those cases, packets can tell bold-faced lies.

When digging through trace files, we can come upon symptoms in the packets that may raise an eyebrow. These are events that look strange on the surface and may even divert our troubleshooting focus for a time. In fact, some of these issues have misdirected engineers for hours, if not days, causing them to chase down issues and events that simply did not exist on the wire.

Most of these examples can be avoided simply by capturing the packets from a tap rather than on the machine generating the traffic. Come on, you know you have needed a tap for a while! Just spring for one and capture correctly next time. By the way, when you do make that decision, check out our buddies at Garland Technology. They make great stuff and they are nice people too!

  1. Very large packets

Continue reading "Are My Packets Lying? – Four Things To Look For In Packet Traces (by Chris Greer)" »


Give me PACKETS!! (by Mike Canney)

Give me Packets!

I have been troubleshooting “network” problems for over two decades.  From mom and pop small businesses to Fortune 10.  Literally thousands of companies.  As far as tools go, I’ve used just about all of them.  From the Network General Sniffer, Novell LanAlyzer, Optimal’s Application Expert/Vantage, Compuware Ecoscope, Cinco NetXray to Wireshark and back.  

You would be hard pressed to find something that is somewhat mainstream that analyzes packets that I haven't used to find and solve network and application issues. Flower issueI’ve have also used the majority of the popular APM/NPM tools on the market for monitoring Network and Application Performance (I won’t list them).  The one thing in common is that they’ve all been useful in their own right.  Understanding at a high level of what traffic is on the network and an inclining of ‘potential’ application performance issues. 

 

Continue reading "Give me PACKETS!! (by Mike Canney)" »


LMTV LIVE | Visibility Architectures - Best Practices for Network Monitoring (with Keith Bromley and Recep Ozdag of IXIA)



YouTube Live Event starts at 9:30AM PST, Wednesday, March 22, 2017


Yx_X0tC2This week we will be speaking with Keith Bromley and Recep Ozdag, Senior Manager of Solutions Marketing and VP of Product Management of IXIA, respectively.

Network visibility is an often overlooked but critically important activity for IT. Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience. A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.

Join us for the first of several discussions to learn what a visibility architecture is and how it can help you optimize network data capture and analysis.


Continue reading "LMTV LIVE | Visibility Architectures - Best Practices for Network Monitoring (with Keith Bromley and Recep Ozdag of IXIA) " »


LMTV LIVE | Best Practices for Network Tapping (with Keith Bromley of IXIA)



YouTube Live Event starts at 9:30AM PST, Wednesday, February 22, 2017


Yx_X0tC2This week we will be speaking with Keith Bromley, Senior Manager of Solutions Marketing of IXIA.

We promise to do our very best to avoid the usual Taps vs SPAN discussion in this live event. But what we will discuss is the following.

  • Taps are part of a well-planned visibility architecture.
  • Taps should be as easy as set and forget.
  • Taps are placed inline in the network but they are passive and only make a copy of the data, i.e. they don’t divert the main traffic flow.
  • Bypass switches are similar to taps but different from taps as they actually divert the data but also provide fail-over mechanisms for network survivability.
  • A virtual tap is a software version of the standard tap except that this can be loaded onto virtualized servers to capture east-west data in the virtual data center.
  • Some best practices for tap placement
    • Use taps where you can to ensure that you get the best data possible as fast as possible
    • Tap your network ingress and egress points
    • Tap any known choke points

Please join us.


Click to read other LMTV posts by contributors of LoveMyTool »


The Importance of Lossless Visibility! (by Keith Bromley)

The Importance of Lossless Visibility!

Does lossless visibility really matter for monitoring tools? 

They’re supposed to be able to handle lost packets, corrupt packets, data gaps, etc., right?

Well, the answer is kinda, sorta, absolutely NO!

Security and monitoring tools are only as good as the data they see, or don’t see. Some tools have capabilities to help them “tolerate” missing data but that is a flawed theory and here’s why.

Missing data can lead to missed or false positive security threats, longer and more costly troubleshooting efforts, and lower customer satisfaction ratings. According to the 2016 Verizon Data Breach Investigation Report, most victimized companies don’t discover security breaches themselves. Approximately 75% have to be informed by law enforcement and 3rd parties (customers, supplier, business partners, etc.) that they have been breached—they had no idea the breach had happened. It’s hard enough to defeat modern network security threats, you don’t want to start off with limited network visibility. But that’s exactly what happens if your monitoring solution (which includes your taps, SPANs, and network packet brokers) does not feed your security and monitoring tools the correct data. For instance, check out this report from the Tolly Group about how one network packet broker drops packets and doesn’t even report it.

Visibility target

Other than missing your target reason for network visibility!

The following list shows some examples of why lossless visibility is important:

Continue reading "The Importance of Lossless Visibility! (by Keith Bromley)" »