<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

ICS Village Series: Aggregating Distributed Industrial Networks

As ICS/OT environments get upgraded and modernized, challenges surface on deploying asset inventory and threat detection solutions within a distributed network. These include monitoring a network covering a significant geographic location and monitoring locations that cannot support additional hardware and need to utilize existing assets.

In the second of our 3 part ICS Village blog and video series on gaining visibility into your critical infrastructure environments, we are going to focus on overcoming distributed network challenges.

Critical infrastructure organizations are known for their unique and geographically dispersed network environments. Sectors such as water, mining, power distribution and transmission, as well as manufacturing can all face network architectures where you may need to secure various segments from different points within a more extensive network.

In addition, the physical location sometimes cannot support additional hardware within these networks due to space, power, environmental, or budget constraints. So how can organizations add a security solution to a distributed network where the location and the distance may present visibility challenges?


Aggregating SPAN traffic to a central security sensor without affecting infrastructure

For environments that cannot physically add additional hardware like network TAPs or multiple security sensors into the current infrastructure, leveraging SPAN ports to mirror the traffic from managed switches becomes the next best option.

A managed network switch typically includes port mirroring, also known as SPAN (Switch Port Analyzer). This capability programmatically designates ports on the switch to send duplicate copies of the network packets seen on one or more ports to a specified port. On this specified port, a network monitoring solution resides to analyze the packets traversing the network. But, without the capability to add additional hardware or security sensors at each physical location due to space, power, environmental, or budget constraints, the next challenge is how to get the SPAN links from the various areas to a centralized sensor.

As depicted in the diagram below, this use case illustrates how to aggregate various SPAN links down to a centralized Dragos sensor.

Utilizing Garland’s High-Density Aggregator TAP, organizations can aggregate SPAN traffic from four or more distributed locations into one specific device, feeding all the network packet details and contents to the Dragos sensor.



After receiving the packets, the Dragos sensor performs some initial pre-analysis work. It then sends the appropriate metadata over to the Dragos Platform, which typically sits in Level 3 or 4 of the Purdue Model reference architecture, where primary reporting and notifications happen.

This use case incorporates existing switch infrastructure, aggregating the various links through an aggregator TAP and then to the security sensor without affecting the infrastructure.


Aggregating network TAP traffic to a central security sensor from distributed locations

Another use case is to TAP instead of relying on the switch SPAN. Utilizing SPAN can be a common challenge in legacy environments or unavailable on unmanaged switches. Suppose the infrastructure has several fiber optic cables running from various sites coming back into one centralized place. We could deploy passive fiber network TAPs and ultimately aggregate those to the sensor.

Adding plug-and-play network TAPs and traffic aggregation allows the legacy infrastructure to remain in the original configuration to continue safe and reliable operations while providing the packet visibility needed to manage and secure assets without making device modifications. Network TAPs are purpose-built hardware devices, which allow you to analyze network traffic by copying packets, without impacting network integrity.


With this deployment scenario, as seen below, network traffic is being fed to the Dragos Platform. A deployment like this gives a complete asset inventory list and a map view of the various locations of the network like firewalls, PLCs, network switches, HMIs or human-machine interfaces, IP addresses, MAC addresses, and more, spread across an extensive network infrastructure.


These are two good use cases for providing packet visibility and a security platform in a distributed network that minimizes the impact to the infrastructure.

In our third iteration of this blog and video series, we will review how to quickly deploy a proof of concept to simultaneously compare multiple asset inventory and threat detection solutions.

Watch the ICS Village demonstration ‘Aggregating Distributed Networks To Gain Visibility Into Your Critical Infrastructure’

Want more information?

Click here to watch the full ICS Village demo ‘Gaining Visibility Into Your Critical Infrastructure.’ Or explore the Dragos and Garland Technology solution brief here.

Written by Tom VanNorman

Tom is the Co-Founder of ICS Village. ICS Village offers an interactive learning experience for different components of industrial control system security. Explore your areas of interest and learn from experts about the many systems and components that need to be secured.

Authors

Topics

Sign Up for Blog Updates