<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Fresco desde el grifo. Filtrado de información, El Bartender de datos

March 27, 2018

Barkeeper pulling a pint of beer behind the bar-1

English version

Es un hecho, las herramientas de seguridad y monitoreo se expanden como hiedra dentro de los centros de datos en los clientes, de hecho, algunas veces hay decenas en algunas organizaciones y hasta a veces replicadas dependiendo del tamaño de la institución o empresa. Los ingenieros y administradores de la red y seguridad de la información luchan constantemente por acomodar los dispositivos de manera que sean eficientes y también para que no impacten negativamente el desempeño de la red.

Lo cierto es que cada herramienta maneja un flujo de datos determinado para dar reportes y análisis para las cuales fueron adquiridas, algunas de ellas tienen la capacidad de descartar los datos que no le son útil para su proceso, hay otras que no, esto influye directamente en su rendimiento y a la vez a la eficiencia de la red también.  

Para hacer más eficaces estas herramientas se filtran los datos que llegan a sus puertos de conexión a la red y esto les garantiza que solo la información de su interés le son enviados y a la vez evita un desbordamiento de data innecesaria en sus puertos de monitoreo.
Watch the 101 on Filtering now!

Hay excelentes dispositivos que desempeñan estas funciones de selección, hay TAPs, y también hay Network Packet Brokers que son más sofisticados y con una gran capacidad de reglas de filtrado. Lo cierto que dependiendo de qué tipo de datos las herramientas necesitan procesar estos dispositivos les pueden entregar los de su preferencia, tal como un bar tender te prepara y sirve el trago de su gusto.

Así mismo para la selección de cuál de estos productos son los que más se ajustan a sus necesidades es imprescindible conocer el diseño de la red, además es sumamente importante cual fabricante escoger para que les provea estos equipos. En mi caso mi “bartender” es Garland Technology, aparte de la variedad y excelencia de sus productos ellos pueden ayudarme a construir el diseño que más se adapte a mis necesidades de filtrado de información y de mi red. ¡Salud!

 

Fresh from the TAP! Information Filtering, A Data Bartender

 

It’s a fact, security and monitoring tools expand like ivy inside clients’ data centers. In some organizations there are dozens of different tools being used, and sometimes even replicated depending on the size of the institution or company. Engineers, Network Administrators, and Information Security teams are constantly struggling to accommodate devices, so they can be efficient enough so as to not negatively impact network performance.

The truth is that each tool manages a certain flow of data to give reports and analysis for which they were acquired. Some tools have the capacity to discard the data that is not useful for their process, while others cannot. This directly impacts their performance, and at the same time the network’s efficiency.

To make these tools more efficient, data reaching their ports should be filtered to guarantee that only the information of interest is sent to them, and simultaneously avoiding unnecessary data overflow of their monitoring ports.

network engineer working in  server room, corporate business man working on tablet computer-1

There are excellent hardware devices that perform filtering: Network TAPs and Network Packet Brokers. The truth is that depending on what type of data the tools need to do their job,  these devices can deliver just that, just like a bartender prepares and serves you the drink of your choice.

Just as it is important to select products that best fit the design and needs of your network, it’s also extremely important to choose who should be the manufacturer of these products. In my case, my "bartender" is Garland Technology. Not only because of the variety and excellence of their products, but they can help me build the solution that best suits my information filtering needs. Cheers!

[Want to learn more about filtering with your Network TAP? Watch our 101 Video on Filtering which takes an even deeper dive.]

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES