<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

The 101 Series: Breakout Network TAPs

October 11, 2018

Bypass Network TAPs Garland Technology Security

I recently wrote a blog about the six different types of network TAPs with a brief overview of each TAPs functionality. In this blog, I’m going to explain in detail more about how the breakout or commonly referred to tap mode operates. Let's talk 'breakout' TAPs.

Why use a 'Breakout' TAP?

A breakout TAP is used when utilization is very high and packet loss is not an option. The common use case is for network and application monitoring, performance and analysis. Breakout or normal TAPs are available for copper and fiber networks. In a separate blog we can dig deeper into those differences.

There are TAPs designed to act only in breakout or normal TAP mode, or only as an aggregating TAP, as well as multi-functional modes (Filtering or Bypass TAPs). It's best to know your needs before investing, because as your network evolves, so do your monitoring and access needs.

So, let's begin. To keep everything simple, let’s look at how we would attach a breakout TAP into the link that goes between a network router and a network switch so we can attach a protocol analyzer.

East and West Traffic

Figure 1: Simple Full Duplex Network Link

How a Breakout Network TAP Works:

  1. To set up a TAP in breakout mode, first disconnect the cable that connects the router to the switch.
  2. Connect the cable to port A on the network TAP.
  3. With a second cable, attach one end to port B of the TAP and the other end to the port on the switch that we just disconnected.
  4. With no power applied to the TAP, the link will reestablish and traffic will flow again between the two devices.

Network flow

Figure 2: Shows how the network traffic will flow between the two end devices. This is before the power is applied to the TAP, so there will not be any traffic flowing out of ports C and D.

>> Download Now: Network TAPs 101 [Free eBook]

Network Flow with a Breakout TAP and Monitoring Tool

  1. Now apply power to the TAP.  
  2. The traffic will flow from the router to port A of the TAP out port B of the TAP to the switch in the eastbound direction.
  3. The eastbound traffic will also be sent out port C of the TAP to a Network Interface Card (NIC) on the protocol analyzer.

In the westbound direction, the traffic will flow from the switch to port B of the TAP and out port A to the router. The westbound traffic will also be sent out port D to the second NIC on the protocol analyzer.

Because only the eastbound traffic is on port C and the westbound traffic is on port D, the analyzer needs to have two NIC installed allowing the analyzer to receive ALL the network traffic that is running on the link.  Even jumbo packets and packet errors are passed along to the analysis tool.

If the analysis tool doesn’t have two NICs, then you can still analyze the traffic coming from port C or the traffic coming from port D, but not at the same time.

In my Aggregation blog, I explain and show you how you can see all the link’s traffic with only one NIC on the analyzer. The nice thing about the breakout TAP is that the monitor ports cannot be oversubscribed.  All the eastbound and westbound traffic that is presented to the TAP will be sent out port C or D including packet errors.

When traffic flow loses power

Figure 3: Traffic flow when TAP loses power


No "Point of Failure”

If the TAP loses power (or has no power applied), the traffic on the live link will continue to flow with no interruption as shown in Figure 3.  The monitor ports will no longer forward traffic, but the live link is still operational – this provides the peace of mind that your network link will continue to flow, even if your TAP loses power.

Garland Technology's, The 101 Series is an educational series on how network TAPs work and the different functions they provide to the overall network design for access and visibility.

Looking to add a visibility solution to your next deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!

Network TAPS 101 Basics for IT Security engineers

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES