Packets don’t lie – well, most of the time. They tell the truth unless they have been captured incorrectly. In those cases, packets can tell bold-faced lies. When digging through trace files, we can come upon symptoms in the packets that...
For years now we all have read about the difference between data capture off a span/mirror port and a network TAP. Packet Pioneer, Chris Greer was interested to see the difference between a data stream captured on a network TAP versus a...
Thank you networking community! You voted and we are pleased to announce the top 'Tap into Technology ' blog posts of 2016. Below are the top 3 posts from 2016. Thank you for being a part of the Garland community and we look forward to the...
How trusted does your data have to be? In today's world of data breaches and hacks, it is best to be capturing 100% of your data. In the court of law, dropped packets equal unsubmittable evidence. Learn what makes network TAPs approved for...
The two most common methods to access network data are via a Network TAP or from a SPAN port. How much do you know about Network TAPs? If you don't use them, maybe you think it's just another failure point or there may be a forwarding...
Most network engineers are familiar with how to configure a SPAN port on a switch. This is a common way to get access to the network data to perform network analysis and connect various packet capturing monitoring tools to it. When...