DS NTB Us
DS NTB Us
DS NTB Us
Traffic
Broker
D A T A S H E E T
Array Traffic Brokers offer enhanced visibility,
improved security, scalability, performance
optimization, simplified management, cost
efficiency,and compliance benefits, making
them valuable components of modern network
infrastructure.
Pervasive Inspection
A common data acquisition infrastructure to monitor WAN to LAN, Physical, Virtual, OOB, In-line.
Perimeter Defense
Detect, trace and block Internet connection in the frontline according to a massive blacklist of IP and domains.
Function List
Any-to-Any Delivery
Each interface can be INPUT or OUTPUT
1-to-many, many-to-1, many-to-many
To any selected interface after filtering
Advanced Distribution
Filter Processor
Composed of a set of rules with AND/ OR operation
Session-based filtering and packet-based filtering
L2-L4 header filtering rule: MAC address, Ethertype, VLAN ID, IP range, TCP/UDP port...
DPl-enabled Filter Processor
L4-L7 Pattern-based filtering
Pattern format: HEX, ASCII strings and Regular Expression
Tunnel-awareness filter
Apply all filtering rules on in-tunnel packets where GRE / VxLAN / QinQ / MPLS
Tunnel ID (ERSPAN/X-tunnel) filtering
Processor Chain
User-defined graphs of Filter Processors
Function List
Packet Engineering
Tag removal: MPLS / VLAN / QinQ...
Unpacking Tunnel (Tag removal and re-encapsulation): GRE / GTP / ERSPAN / NvGRE / VxLAN
User-defined VLAN tagging for input packets or output packets
Packet Deduplication
Front-line Security
Massive Blocking
- IP/ Domain/ URL
- Max 2,000,000 entries
3rd party threat intelligence import
Dimension 1U, 17.3” Wx8.6”Dx1.7”H 1U, 17.3” Wx8.6”Dx1.7”H 1U, 17.3” Wx8.6”Dx1.7”H 1U, 17.3” Wx8.6”Dx1.7”H
1:1 Netflow
Metadata Extraction
DNS/SSL syslog
IoC(IP/Domain/URL) Capacity 1M 1M 1M 3M
Power Supply Single PowerAC110-220v Single PowerAC110-220v Single PowerAC110-220v Dual PowerAC110-220v
Hardware Specs
Dimension 1U, 17.3” Wx8.6”Dx1.7”H 1U, 17.3” Wx8.6”Dx1.7”H 1U, 17.3” Wx 21”Dx1.7”H 1U, 17.3” Wx 21”Dx1.7”H
1:1 Netflow
Metadata Extraction None None
DNS/SSL syslog
Power Supply Dual PowerAC110-220v Dual PowerAC110-220v Dual PowerAC110-220v Dual PowerAC110-220v
Hardware Specs
Delivery Accuracy
NTB aggregates several inputs and accurately delivers the packets by not only L2-L4 filtering but also the application-aware patternbased
filtering above L4 : filter HTTP connection packets by HTTP URL, filter SIP messages by SIP URI, filter DNS by domain and so
on.
NTB’s Fair-Distribution mechanism satisfies every analysis device by properly duplicating the packet that belongs to the demand
intersection for multiple analysis devices.
Filtered traffic can be distributed to a group of egress ports with session-based balancing strategy to guarantee “same session to the
same destination”. When one egress port is disconnected, NTB failovers the stream to the stand-by port or redistribute to the other
ports in the group.
Moreover, slicing packet payload is supported for analysis offload such as removing TCP/UDP payload for the device that works on
L2-L4 header only.
NTB supports Intelligent Bypass function to protect production network when in-line analysis devices are deployed. It detects the status
of in-line device and immediately enable bypass when that device gets problems. The uniqueness of NTB is to bypass the traffic which
is not the packet of interest or with little risk. For example, the enterprise deploys IPS guarded by NTB to avoid YouTube from entering
IPS.
Netflow Generation
Some analysis devices also have a lightweight approach: processing Netflow instead of raw packets. Routers or switches are able
to generate Netflow but the performance downgrade is inevitable. The better alternative is to let NTB generate Netflow v5/v9 by
aggregating and analyzing the span traffic from those routers or switches while span is not a heavy burden. Besides Netflow, NTB
is able to generate the application log for HTTP requests.
Software-defined Monitoring
NTB xUDN provides a XML script interface to fully control NTB. Comparing to APIs library, XML script is much easier for
implementation with little learning overhead.
To centralize the analysis resources such as network security devices, we can create the tunnel between two NTBs so that monitoring
traffic, mirror span, from different offices can be aggregated to the single site, the tunnel receiver, through IP network. NTB support the
proprietary X-tunnel and ERSPAN to carry the span traffic to form a many-to-one topology. The tunnel receiver unwraps the tunnel
traffic and distinguish the sender by tunnel ID.
VM Traffic Monitoring
VM Traffic Monitoring
NTB can direct the traffic inside the virtualization environment to those analysis resources which have been in physical networks
Feature Description
L2~L4 filtering:
NTB is capable of filtering packets by utilizing the protocol headers from Layers 2 to 4 to identify and isolate specific packets. Once
these packets are isolated, further modifications or actions can be executed on them.
Traffic aggregation:
NTB’s functionality allows for the merging of traffic from various ports into one unified stream. This streamlined process enhances
network management, efficiency, and bandwidth utilization, facilitating improved input for security devices and the provision of
VPN services.
Packet duplication:
NTB can replicate data streams from an ingress port to multiple egress ports. Combined with filtering and packet modification
functionalities, this feature enables the achievement of specific, desired outcomes.
Traffic Redistribute:
NTB enables the redirection of traffic from any ingress port to any egress port. Coupled with additional NTB features, this function
streamlines network management and bolsters network flexibility and scalability, particularly in environments with complex network protocols.
Threat Blocking:
NTB can block HTTP, SIP, and DNS traffic using specific identifiers like URLs and domain names. This feature allows NTB to efficiently
block millions of IOCs, outperforming traditional firewalls in scale and efficiency.
Hardware Bypass:
NTB is equipped with a hardware bypass port. These ports work in pairs, ensuring that, should the NTB become unavailable, the paired
bypass ports will maintain a pass-through connection.
Tunneling Support:
NTB can establish tunneling connections with other NTBs, enabling the collection of metadata from offsite networks. This capability
facilitates the consolidation of network monitoring into a single environment.
Feature Description
Heartbeat Protection:
NTB can send heartbeat packets to assess the health of the network path and intelligently bypass any disabled segments based on
the feedback from these heartbeat packets.
Deduplication:
As NTB gathers packets from different network segments, duplications of the same packet can occur, potentially causing traffic congestion
and overwhelming security devices. Implementing deduplication can resolve this by removing duplicate copies of packets.
Packet Slicing:
Many network data analyzers do not require access to packet payloads. By eliminating these payloads, there’s a reduction in the risk of
sensitive data leakage, as well as a decrease in traffic volume. This allows for more packets to be forwarded efficiently.
Feature
L2~L4 filter
Traffic Aggregation
Packet Duplication
Traffic Redistribute
Vlan Stripping
Threat Blocking
Hardware Bypass
Tunneling Support
Heartbeat Protection
Deduplication
Packet Slicing
www.arraynetworks.co