<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

6 Reasons to TAP your Network

March 7, 2024

6 Reasons to TAP your Network

Intro

Why do I need TAPs? That's a question I hear a lot from the network and security teams I frequently talk to. Either there isn’t familiarity with TAPs or they may think there isn’t an application that makes sense for them.

We’ll I’m here to tell you that there is an application for Network TAPs for pretty much every network. Even if you have low utilization on your SPAN port, industry best practice is you should use a network TAP as the foundation of your visibility for today and for the future. The 6 most popular applications for TAPs we see from customers are:


Visibility into the Network

Using a Network TAP, or test access point, provides complete visibility into your network, allowing you to see every packet of data flowing into and out of your network. With a visibility point in your network, you can analyze e-commerce and web server traffic, VoIP and real-time communication applications, and gain the insights you need to optimize network performance, among others.


Prevent Network Downtime

With a Bypass TAP, you avoid network downtime as the TAP’s only functionality is to provide copies of traffic to the active, inline device. Because of the heartbeat packets included in Bypass TAPs, if you have any issues with your tools, you can easily take that active, inline device offline for testing, updates, and changes while the live network data still flows. A switch on the other hand has to focus on it's "production network" while combating anomalies like DDoS attacks, so if there is an issue with an inline device like a NGFW, you would have to take the network down.


Speed Conversion

With today’s upgraded networks, I’m starting to see 40G and 100G networks a lot more. The question that comes next is, what do you do with all of your old monitoring tools that were running at 10G? Rather than purchasing updated tools for these new network speeds, which can be very expensive or even unavailable on today’s market, utilizing network TAPs plus a purpose built packet broker at the access layer allows for any-to-any configuration of network speeds. 


Lawful Intercept

In the case that you need to prove evidentiary chain of custody for a court case, a Network TAP must be used to prove that no packets were dropped during the lawful intercept process. Network TAPs are CALEA approved because they ensure all data arrives at the monitoring or analyzer tool, and that it wasn’t hacked. SPAN ports can’t say that.


Connecting Multiple Monitoring Tools

What happens when you have multiple monitoring devices you want to use to analyze your network? With an aggregator TAP, 100% full duplex traffic is captured in both directions from your network and sent out of 2 monitoring ports, so you can send your traffic from that point in your network to Wireshark AND an APM. More tools than that? No problem, we’ll just use a 1U/2U chassis populated with as many TAPs as you need to get the job done.

TAP-vs-SPAN-Everything-You-Need-to-Know-CTA


Protect a SPAN Port

There are situations where the use of a SPAN Mirror Port on a Switch is needed to connect an out-of-band tool or sensor to the IT or OT network. In this instance, it is a best practice to use a Hardware Data Diode between the SPAN Mirror Port and the out-of-band tool or sensor. The Hardware Data Diode will pass copies of network traffic from the SPAN Mirror Port to the out-of-band tool or sensor and, most importantly, eliminate bidirectional traffic flow so no data is passed back into the Switch Mirror port from the tool or sensor.


Looking to add Network TAPs to your next deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!


Glossary

  1. Network TAPs (Test Access Points): A network TAP is a purpose-built hardware device that allows you to access and monitor your network traffic by copying packets without impacting or compromising network integrity.
  2. CALEA Compliance: The Communications Assistance for Law Enforcement Act (CALEA) is a United States federal law that mandates telecommunication service providers and equipment manufacturers to provide technical capabilities for lawful electronic surveillance and interception when required by authorized law enforcement agencies.
  3. Unidirectional traffic: Hardware Data Diodes and Data Diode TAPs ensure packets don't go back into the live network. Traffic cannot be injected back onto the network from the monitoring ports.
  4. Port Mirroring: Also known as SPAN (Switch Port Analyzer), are designated ports on a Switch that are programmed to send a copy of network packets seen on one port to another port, where the packets can be analyzed.

New call-to-action

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES