More Related Content Similar to Advanced Network Traffic Intelligence with GigaSmart - Product Brief (20) Advanced Network Traffic Intelligence with GigaSmart - Product Brief1. 1© 2013-2015 Gigamon. All rights reserved.
Drive Your Traffic with Intelligence
GigaSMART®
technology extends the intelligence and value of
the Gigamon Unified Visibility Fabric™ by enhancing your
monitoring infrastructure and improving tool performance. A range
of applications are available to optimize the traffic sent from your
network to the tool you rely upon to monitor, manager, and secure
that network. GigaSMART’s advanced processing engine can be
accessed anywhere within the Visibility Fabric without port- or
card-based restrictions. GigaSMART engines can be combined to process higher traffic
loads and optimized for specific applications. Operations can be combined or “service
chained” so traffic benefits from multiple functions at once, such as generating NetFlow
after duplicates have been removed or stripping headers before load balancing to tools.
Network monitoring tools perform more efficiently by eliminating unwanted content with
the de-duplication and packet slicing features. SSL Decryption provides visibility into
encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking
allows network security teams to hide confidential information such as passwords,
financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI
compliance regulations. Organizations can improve accuracy with the source port labeling
and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet
distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when
combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.
The advanced processing capabilities of the GigaSMART engine can also be leveraged to summarize and generate NetFlow statistics
from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of
expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations
and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning
and enforcing security policies.
Features & Benefits
Quick Specs
üü High-performance compute engine
üü Available on GigaVUE H Series and
GigaVUE-2404
üü Packet transformation, packet
modification, and stateful session
correlation
üü Service chaining capability to
combine multiple GigaSMART
operations
üü Advanced traffic intelligence
available across the entire cluster
without any port-level or card-level
restrictions
Product Brief
GigaSMART
Adaptive Packet Filtering De-duplication
• Add labels to the packets indicating the ingress port
• Easily identify where a packet is coming from
• Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data stream
• Intelligent protocol-aware filtering across advanced
encapsulation headers including VXLAN, VN-Tag, GTP, MPLS,
etc., and inner (encapsulated) Layer3/Layer4 packet contents
• Advanced visibility into the application layer using pattern
matching regular expressions-based filters
• Mask private and sensitive data in the packet before it gets
stored, maintaining SOX, PCI, and HIPAA compliance
2. Product Brief: GigaSMART
2003-12 05/15
3300 Olcott Street, Santa Clara, CA 95054 USA | +1 (408) 831-4000 | www.gigamon.com
© 2013-2015 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the United States and/or
other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks
of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
• Eliminate the need for monitoring tools to decipher protocols
• Allow easy filtering, aggregation, and load balancing of packets
with headers removed
• Support for ISL header/trailer removal and VXLAN, VNTAG,
VLAN, MPLS, and GTP-U tunnel stripping
Header Stripping
Load Balancing
• Add labels to the packets indicating the ingress port
• Easily identify where a packet is coming from
• Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data streams
NetFlow Generation
• Increase infrastructure efficiencies by offloading NetFlow
Generation to the Visibility Fabric
• Out-of-Band solution completely eliminates the risk of dropping
production traffic on busy routers or switches as a result of
generating NetFlow
NetFlow Generation continued
• Unsampled 1:1 NetFlow record generation to facilitate true
response and root cause capability
• Integrated traffic visibility solution with NetFlow Generation
support simultaneously provides both flow and packet statistics
to a variety of monitoring, analysis, and security tools
Masking
• Overwrite packet data between ad 64-9000 byte offset
• Conceal private data including financial and medical information
Source Port Labeling
• Add labels to the packets indicating the ingress port
• Easily identify where a packet is coming from
• Enhance the efficiency of your network monitoring tools by
eliminating the potential of duplicate data streams
SSL Decryption
• Provide visibility into encrypted sessions
• Send decrypted packets to multiple out-of-band tools: IDS, DLP,
APM, CEM, etc.
• Private server keys are encrypted and protected by role-based
access controls
Time Stamping
• Add Packet time stamps at line rate for subsequent analysis
• Troubleshoot and measure application response times jitter
and latency
• Applicable for GigaVUE-2404
Tunneling
• Encapsulate and forward packets to monitoring tools between
networks on separate routed paths
• Enable routing of data from lights-out data centers to central
monitoring facilities
• Reduce packet size to increase processing and
monitoring throughput
• Optimize the deployment of forensic recorder tools
Packet Slicing
FlowVUE™
• Flow-aware sampling of active subscriber devices to selectively
reduce traffic
• Preserve or increase CEM based on real-time reduced data
analytic throughput
• Leveraging Big Data to tailor marketing campaigns, pricing
strategies, etc., based on subscriber usage patterns
GTP Correlation
• Optimize tool infrastructure by accurate filtering, replicating,
and forwarding monitored subscriber sessions
• Correlate subscriber sessions (control and data) to offload tools,
increasing throughput
• Facilitate drilldowns into roaming users across peer networks