SlideShare a Scribd company logo
1 of 17
Download to read offline
LAN, WAN, SAN,
   and now
     DAN
Data Access Network
What’s a DAN?
                             out-of-band passive monitoring network
                             Includes passive tools like:
                             Security IDS Sensors,
                             Application Performance Monitors,
                             Troubleshooting Protocol Analyzers,
                             VoIP QoS Probes,
Proprietary & Confidential




                             Forensic Recorders,

                             and Data Access Switching
DAN provides “Data Sockets”
                                       Part of a Flexible Network Infrastructure
                             •   Plug-in multiple out-of-band tools – ANY data to ANY tool
                             •   Unobtrusive 24x7 tool connections – never touch the network
                             •   Aggregate, Replicate, Filter and load balance data streams
                             •   Use legacy 1Gig tools to monitor new 10Gig networks
Proprietary & Confidential




                                                                                               3
Why are DANs Needed Now?
                                          Things Have Changed

                             Enron and 9/11 spawned SOX auditing, increased security
                             and lawful intercept requirement


                             PLUS technology and business developments:
                             Web site e-commerce and internet applications demand support
                             VoIP and media convergence make the network more strategic
Proprietary & Confidential




                             Green networking demands smaller Data Center footprint
                             Network is how business gets done. Downtime is unacceptable
Proliferation of Tools
                             New SOX compliance transaction monitors
                                Keep your boss out of jail!


                             IDS Sensors detect external attacks
                                From hackers

                             NAC appliance protects networks from inside
                                From your own people!


                             CALEA lawful intercept and Forensic Recorders
                             Configuration monitoring tools watch over network
Proprietary & Confidential




                             resources

                             Application and Network troubleshooting
Proliferation Causes Contention
                                       for Span Ports




                                                Security and IT
                                               Engineers seen
                                                     here
Proprietary & Confidential




                                              “Negotiating” Over
                                                 a SPAN Port
An Analogy:


                             Using a DAN is like using a power strip.
Proprietary & Confidential
Too Many Power Tools?
                              Not Enough Sockets?



                                   ?

                               ?             ?
                                         ?
Proprietary & Confidential
For Power Tools, use a Power Strip
Proprietary & Confidential
Too Many Monitoring Tools?
                               Not Enough Span Ports?

                                 ?

                                 ?
                                                 ?

                                  ?
Proprietary & Confidential
For Sensors/Monitors/Analyzers,
                                    Use a DAN Switch
Proprietary & Confidential




                              One Span port serves Many tools
What Other Problems do DANs
                                               solve?
                             Distributed Monitoring burning the budget?
                                Consolidate tools; $ave money on capital and operational budgets


                             Unsecure monitor or tap ports risk data leakage?
                                DAN can secure all access point to prevent snooping


                             Too much traffic for one tool?
                                Reduce and balance load over multiple units to match tool capacity
Proprietary & Confidential




                             Restrictive Configuration Management Policies?
                                Deploy tools and make changes on your own schedule
Monitoring a Mesh Network?
Proprietary & Confidential
Old Solution: Lots of Distributed Tools,
                                Deploy one tool per span port/switch
Proprietary & Confidential




                                         Lots of hardware…very expensive!
Better: Distribute Connections with a DAN
                                  Consolidate Tools; Save CapEx $$$
Proprietary & Confidential




                              Aggregate and balance flows to Consolidated Tools
DAN is “Best Practice” for Network
                                   Infrastructure Design
                             Totally flexible solution to many problems

                             Facilitates unobtrusive instrumentation of a network

                             Solves requirement for multiple tool access

                             Gives tools the view of the total network

                             Secures monitor and tap ports
Proprietary & Confidential




                             Improves monitor coverage, saves time and money.
DAN Solves Access Problems By

                             • Aggregating many links to any tool
                               • Multicasting any link to many tools
                                  • Filtering data to map packets to tools
                                      • Saving $$ Cap Ex and Op Ex budget$
Proprietary & Confidential




                                   Any to Any   Many to Any   Any to Many   Bit-Mask Filtering

More Related Content

What's hot

apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

What's hot (20)

Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!
 
Physically securing the wireless installation
Physically securing the wireless installationPhysically securing the wireless installation
Physically securing the wireless installation
 
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Intercept product
Intercept productIntercept product
Intercept product
 
Day1
Day1Day1
Day1
 
Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT Expert
 
Ids 001 ids vs ips
Ids 001 ids vs ipsIds 001 ids vs ips
Ids 001 ids vs ips
 
PetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga ShpigelPetNovations case study_architecting IoT systems - Olga Shpigel
PetNovations case study_architecting IoT systems - Olga Shpigel
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 
Air heads rio 2010 aruba pef overview
Air heads rio 2010   aruba pef overviewAir heads rio 2010   aruba pef overview
Air heads rio 2010 aruba pef overview
 
SIGFOX Makers Tour - Madrid
SIGFOX Makers Tour - MadridSIGFOX Makers Tour - Madrid
SIGFOX Makers Tour - Madrid
 

Viewers also liked

Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
PerformanceVision (previously SecurActive)
 

Viewers also liked (20)

Network Monitoring Trends 2014
Network Monitoring Trends 2014Network Monitoring Trends 2014
Network Monitoring Trends 2014
 
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 hKappelman tribalnet - trends in IT infrastructure - 16nov2011 h
Kappelman tribalnet - trends in IT infrastructure - 16nov2011 h
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure Monitoring
 
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
TheThingsNetwork Rhein-Neckar - Kurz-Pitch für den 22.2.
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPCPerforming Simulation-Based, Real-time Decision Making with Cloud HPC
Performing Simulation-Based, Real-time Decision Making with Cloud HPC
 
Strategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructureStrategic options for datacenter operations - Nordic market and infrastructure
Strategic options for datacenter operations - Nordic market and infrastructure
 
PRTG
PRTGPRTG
PRTG
 
SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)SteelCentral Network Planning and Configuration Management (NPCM)
SteelCentral Network Planning and Configuration Management (NPCM)
 
Open Source Logging and Monitoring Tools
Open Source Logging and Monitoring ToolsOpen Source Logging and Monitoring Tools
Open Source Logging and Monitoring Tools
 
Managing and Monitoring Application Performance
Managing and Monitoring Application PerformanceManaging and Monitoring Application Performance
Managing and Monitoring Application Performance
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Application Performance Monitoring (APM)
Application Performance Monitoring (APM)Application Performance Monitoring (APM)
Application Performance Monitoring (APM)
 
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
 

Similar to Data Access Network for Monitoring and Troubleshooting

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
gigamon
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
Advantec Distribution
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
OpenStorageSummit
 

Similar to Data Access Network for Monitoring and Troubleshooting (20)

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
SWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive ComparisonSWG Buyer Guide: Competitive Comparison
SWG Buyer Guide: Competitive Comparison
 
Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44Using sdn to secure the campus - Networkshop44
Using sdn to secure the campus - Networkshop44
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 

More from Grant Swanson

More from Grant Swanson (12)

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis Architecture
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone Wild
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP Technology
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
 
Gigamon U - Its Not The Network
Gigamon U - Its Not The NetworkGigamon U - Its Not The Network
Gigamon U - Its Not The Network
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 

Data Access Network for Monitoring and Troubleshooting

  • 1. LAN, WAN, SAN, and now DAN Data Access Network
  • 2. What’s a DAN? out-of-band passive monitoring network Includes passive tools like: Security IDS Sensors, Application Performance Monitors, Troubleshooting Protocol Analyzers, VoIP QoS Probes, Proprietary & Confidential Forensic Recorders, and Data Access Switching
  • 3. DAN provides “Data Sockets” Part of a Flexible Network Infrastructure • Plug-in multiple out-of-band tools – ANY data to ANY tool • Unobtrusive 24x7 tool connections – never touch the network • Aggregate, Replicate, Filter and load balance data streams • Use legacy 1Gig tools to monitor new 10Gig networks Proprietary & Confidential 3
  • 4. Why are DANs Needed Now? Things Have Changed Enron and 9/11 spawned SOX auditing, increased security and lawful intercept requirement PLUS technology and business developments: Web site e-commerce and internet applications demand support VoIP and media convergence make the network more strategic Proprietary & Confidential Green networking demands smaller Data Center footprint Network is how business gets done. Downtime is unacceptable
  • 5. Proliferation of Tools New SOX compliance transaction monitors Keep your boss out of jail! IDS Sensors detect external attacks From hackers NAC appliance protects networks from inside From your own people! CALEA lawful intercept and Forensic Recorders Configuration monitoring tools watch over network Proprietary & Confidential resources Application and Network troubleshooting
  • 6. Proliferation Causes Contention for Span Ports Security and IT Engineers seen here Proprietary & Confidential “Negotiating” Over a SPAN Port
  • 7. An Analogy: Using a DAN is like using a power strip. Proprietary & Confidential
  • 8. Too Many Power Tools? Not Enough Sockets? ? ? ? ? Proprietary & Confidential
  • 9. For Power Tools, use a Power Strip Proprietary & Confidential
  • 10. Too Many Monitoring Tools? Not Enough Span Ports? ? ? ? ? Proprietary & Confidential
  • 11. For Sensors/Monitors/Analyzers, Use a DAN Switch Proprietary & Confidential One Span port serves Many tools
  • 12. What Other Problems do DANs solve? Distributed Monitoring burning the budget? Consolidate tools; $ave money on capital and operational budgets Unsecure monitor or tap ports risk data leakage? DAN can secure all access point to prevent snooping Too much traffic for one tool? Reduce and balance load over multiple units to match tool capacity Proprietary & Confidential Restrictive Configuration Management Policies? Deploy tools and make changes on your own schedule
  • 13. Monitoring a Mesh Network? Proprietary & Confidential
  • 14. Old Solution: Lots of Distributed Tools, Deploy one tool per span port/switch Proprietary & Confidential Lots of hardware…very expensive!
  • 15. Better: Distribute Connections with a DAN Consolidate Tools; Save CapEx $$$ Proprietary & Confidential Aggregate and balance flows to Consolidated Tools
  • 16. DAN is “Best Practice” for Network Infrastructure Design Totally flexible solution to many problems Facilitates unobtrusive instrumentation of a network Solves requirement for multiple tool access Gives tools the view of the total network Secures monitor and tap ports Proprietary & Confidential Improves monitor coverage, saves time and money.
  • 17. DAN Solves Access Problems By • Aggregating many links to any tool • Multicasting any link to many tools • Filtering data to map packets to tools • Saving $$ Cap Ex and Op Ex budget$ Proprietary & Confidential Any to Any Many to Any Any to Many Bit-Mask Filtering