Today, enterprises with large, complex networks often find it overwhelming to manage their networks to minimise outages and performance issues. All enterprises MUST look to secure and manage their growing network traffic demands by having complete network visibility. Cubro Network Visibility enables organisations to meet these challenges with solutions that deliver high ROI, cutting-edge features, andexceptional reliability.
Data Center of a leading Utility Company in Austria faced the challenge to aggregate traffic in high bandwidth and streamline traffic to the monitoring tool for detection of malicious behaviour and potential threats. The enterprise wanted to find a solution which would save cost on flow monitoring.
The increase in network speed requires tools which can keep pace with the changing requirement and make the data centre highly reliable. The network visibility tools need to provide real-time accurate analysis for network management and operations team. The solution involves dealing with two issues:
Challenge 1: Aggregation in high bandwidth
Challenge 2: The possibility to do packet slicing, tagging, and VXLAN removal in multiple of 100 Gbit line rate.
Packet slicing: Packet slicing is the only way to save cost on the monitoring devices because a full bandwidth monitoring in that scale is out of any budget.
VXLAN removal: The feature VXLAN removal saves bandwidth and most monitoring tools cannot handle VXLAN.
VLAN tagging: VLAN tagging is done because the customer wants reports based on links.
Consider a typical loaded 100 Gbit link 80/20 % with an average packet size of 1000 bytes which can transport 12 million packets per second (see table below). If you now slice the packet at 100 bytes which is enough information for typical network monitoring, you can transport 111 million packets on a 100 Gbit port and 44 million packets on a 40 Gbit port. This is a factor 4 or 10 in terms of load and price for the monitoring tools.
Example of high bandwidth flow monitoring solution
1.Improved data security due to early detection of any malicious attacks
2.Increased Performance & Scalability
3.Provided a return on investment by increasing tool efficiency