The process of efficiently directing network traffic to the appropriate monitoring, security, or analysis tools. It ensures optimal resource utilization, prevents overload, and enhances network visibility by intelligently filtering, aggregating, replicating, or load-balancing data flows.
Aggregation combines traffic from multiple sources into one stream. This helps simplify the monitoring process, allowing tools to analyze all the data together.
Aggregation is helpful in environments with traffic coming from various sources (e.g., multiple TAP or SPAN links). Merging these streams ensures comprehensive monitoring while reducing the complexity of managing multiple separate data feeds.
|
||
Non-blocking: Oversubscribing one port will not affect the performance of other ports. Oversubscription counter displaying packets dropped. Many-to-any |
||
Ingress VLAN tagging |
Ingress/Egress/rule VLAN tagging |
Egress/rule VLAN tagging |
Replication is the process of duplicating network traffic and sending identical copies to multiple monitoring or security tools. This allows the same traffic to be analyzed by different systems without affecting the original data flow.
Replication ensures that multiple tools can analyze the same traffic for different purposes, such as performance monitoring, security analysis, data storage, and compliance checks, without interrupting or altering the original traffic. This improves network visibility and ensures comprehensive monitoring across different systems.
By replicating traffic, organizations can deploy different monitoring and analysis tools in parallel, ensuring each tool has the data it needs for its specific purpose. This enhances network visibility and troubleshooting capabilities across different departments or functions.
XX-Series and X2-Series network packet brokers run all rules simultaneously. This simplifies configuration because new rules will not override existing ones. DROP rules take precedence over ALLOW rules in XX, and with the X2-Series, you can configure rule priorities if needed. This parallel approach makes it easy to create scenarios like forwarding live traffic and simultaneously sending a copy for analysis without running into rule conflicts.
|
||
Any-to-many Non-conflicting rule creation |
Any-to-many Non-conflicting rule creation |
Any-to-many Priority-based rule creation Conflicting rule |
Load Balancing is the distribution of network traffic across multiple monitoring or security tools to ensure efficient data processing and prevent overload. Typically, this is done on Layer 3 or Layer 4 of the OSI model.
Layer 3 load balancing distributes traffic based on IP addresses (source or destination). It directs packets to different tools or devices depending on IP hash values.
Layer 4 load balancing also uses port numbers (TCP/UDP) and IP addresses to distribute traffic more granularly. This allows better distribution when multiple sessions or services use the same IP address.
Load balancing relies on hashing techniques to determine how traffic is split. The system computes a hash value based on IP addresses (L3) or port numbers (L4), which it uses to distribute traffic consistently across different monitoring tools or devices. Grouping tools together ensures the load is evenly spread, preventing any tool from becoming overwhelmed.
Round Robin
In Round-Robin mode, traffic is distributed equally across all output ports. This mode is typically used when creating an uplink to move traffic between appliances.
Flow Hash
Flow Hash mode distributes traffic based on the selected header fields. This mode is suggested when multiple tools are attached and ensures that each one gets consistent traffic to perform flow detection and monitoring. Note that if Flow Hash is used with source AND destination options enabled for L3 or L4, the unit will distribute the traffic, maintaining flow symmetry and consistency.
|
||
Flow Hash (L3, L4) |
Flow Hash (L3, L4, IP and Source/destination) Round Robin |
Flow Hash (L3, L4) Round Robin Weighted Round Robin |
High Availability (HA) is a system design approach that ensures continuous operational performance by minimizing downtime. In networking, HA ensures that monitoring, security, or operational tools remain operational even during hardware failures or maintenance.
High Availability is critical for preventing disruptions in network monitoring or security functions. It ensures continuous access to essential services and data, reducing the risk of outages or performance degradation during failures or maintenance.
High Availability network packet broker deployments can be divided into two configuration categories: Active-Active and Active-Passive. Active-Active is used for load balancing and performance optimization, while active-passive is used for simpler redundancy and failover scenarios.
Active-Active HA |
Active-Passive HA |
In an Active-Active HA configuration, all systems or devices process traffic simultaneously. Traffic is distributed between two or more active systems, providing load balancing and failover capabilities. |
In an Active-Passive HA configuration, one system actively processes traffic while the other remains on standby. The passive system only becomes active in the event of a failure of the primary (active) system. |
When to Use Active-Active: |
When to Use Active-Passive: |
|
|
|
|
|
|
When utilizing multiple monitoring or security probes or appliances in a High Availability setup, it’s important that the traffic distribution layer also keeps up.
Profitap packet brokers support High Availability (HA) deployments by ensuring resilient traffic distribution even when links fail. The XX, X2, and X3 models support dynamic Link Aggregation (LAG), which automatically redistributes traffic to remaining links if one goes down, minimizing data loss and downtime. Additionally, the X3 offers both dynamic and static LAG modes, as well as enhanced port redundancy features for an extra layer of protection. This robust design helps to keep monitoring and security probes continuously fed with critical data, sustaining seamless oversight and protection in any HA environment.
When configured in High Availability (HA), the XX and X2-Series network packet brokers forward mirrored traffic to multiple probes using load balancing to distribute incoming traffic between both probes simultaneously for optimal performance.
The NPB monitors the status of each probe in its load balance group. If one probe experiences a failure and its port link goes down, the NPB reconfigures the load balance group so that all traffic is directed to the remaining active probe.
|
||
Active-Active dynamic load balancing |
Active-Active dynamic load balancing |
Port Redundancy Load Balance group redundancy Load Balance Port Replacement (Cascade Group) |