Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

5 Steps for Tagging Packets in Port Channel Architecture

Antiquated infrastructure, slow technology migrations, and limited bandwidth can’t keep pace with the traffic demands of increasingly advanced communications software, real-time data backup solutions, and other high-bandwidth applications.

In other words, both software and demand are always light-years ahead of infrastructure and the human psychology that dictates IT decisions at enterprises—and that gap is widening.

One of the most effective performance solutions for organizations that need more bandwidth, but cannot commit to a full infrastructure migration is port channel architecture. At its most basic, port channel architecture—the generic name for Cisco’s EtherChannel®—unifies up to four separate physical Ethernet links into one link, resulting in a higher-speed connection and increased bandwidth.

But while port channel architecture is an ideal way to support higher demands on networks while enterprises are in the process of migrating their infrastructure, it’s by no means a perfect solution. Because port channel architecture combines up to four separate links into one and enables higher bandwidth than infrastructures would normally handle, it also raises issues with network visibility, traffic monitoring, and security.

Why Is Tagging Packets Necessary for Port Architecture Environments?

Enterprises that utilize port channel architecture need to maintain network visibility to adequately monitor traffic and ensure security. The best way to compensate for the port channel architecture environment’s decreased network visibility is by utilizing technology that tags packets for in-line security applications.

EdgeLens_port-channel-architecture-tagging.png

5 Steps for Tagging Packets in Port Channel Architecture:

1)    Traffic from the four physical links is received by the network TAP and tagged according to its original link.

2)    The traffic is aggregated and load balanced by the network TAP so it does not overwhelm the network, and sent to in-line security appliances such as web application firewalls (WAFs) in a manageable distribution.

3)    The security appliances scrub packets to remove any malicious information.

4)    The security appliances send back the traffic to the network TAP, which removes the tags.

5)    The scrubbed packets are sent to their destination.

This process ensures that port channel architecture environments continue to support and monitor in-line security appliances, guaranteeing safety as well as functionality in this transitional environment.

The Best Tagging Solutions for Port Channel Architecture Environments

One way to support in-line security appliances, such as your Next-Gen Firewall, is through using a network TAP, such as Garland Technology’s FAB, in conjunction with an external network TAP. Another, simpler option is an integrated solution, such as Garland’s EdgeLens® hybrid bypass TAP.

EdgeLens® manages both in-line security appliances and out-of-band monitoring applications, supporting filtering, aggregating, load balancing, and packet tagging for whole-network visibility. Integrated solutions, such as EdgeLens®, are ideal for enterprises that are transitioning to higher speeds and increased bandwidth, and don’t want to invest too much time, energy, and money into overly complicated technology in the interim. 

Learn more about best practices for implementing port channel architecture in your organization by downloading Garland Technology’s free white paper: Maintaining Network Visibility While Implementing Port Channel Architecture.

https://www.garlandtechnology.com/maintaining-architecture-network-visibility-while-implementing-port-channel-lp

Written by Chris Bihary

Chris Bihary has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance through the integration of network test access points. Previously, Bihary was Managing Partner at Network Critical.