7 Reasons Why You Should TAP
March 13, 2018

Chris Bihary
Garland Technology

Share this

Many network operations teams question if they need to TAP their networks; perhaps they aren't familiar with test access points (TAPs), or they think there isn't an application that makes sense for them. Over the past decade, industry best-practice revealed that all network infrastructure should utilize a network TAP as the foundation for complete visibility.

The following are the seven most popular applications for TAPs:

1. Options to Prevent Network Downtime

With a Bypass TAP, you avoid network downtime, as the TAP's only functionality is to provide copies of traffic to the active, inline device. Because of the heartbeat packets included in Bypass TAPs, should you have any issues with the tools, you can easily take that active, inline device offline for testing, updates, and changes while the live network data still flows.

A switch, on the other hand, has to focus on its production network while combating anomalies like DDoS attacks, so if there is an issue with an inline device like a NGFW (next-generation firewall), you would have to take the network down.

2. Update Older Tools

Do you have older monitoring tools that are running at 10G and you are considering 40G or 100G? Rather than purchase updated tools, which can be expensive or unavailable, you can utilize a network TAP with a purpose-built packet broker at the access layer for any-to-any configuration of network speeds. 

3. Take Devices Offline Without Network Interruption

A Bypass TAP can provide copies of traffic to the active, inline device, which can then do their job to combat DDoS attacks, and because of the heartbeat packets included in Bypass TAPs, if you have issues with your tools, you can take that active, inline device offline for testing, updates, and changes without taking down your entire network. 

4. Media/Speed Conversion

Do you have a single-mode, long range cable running between buildings, but the analyzer tool you want to connect to is in the same rack in your network room? Rather than buy an expensive transceiver, a network TAP can handle the media conversion for you.

5. Lawful Intercept

Do you need to prove evidentiary chain of custody for a court case? Unlike SPAN ports, a TAP can be used to prove that no packets were dropped during the lawful intercept process, but make certain the network TAPs are CALEA approved to ensure all data arrives at the monitoring or analyzer tool, and that it wasn't hacked.  

6. Connect Multiple Monitoring Tools

Do you have multiple monitoring devices to analyze your network? With an aggregator TAP, 100% full duplex traffic is captured in both directions and sent out of two monitoring ports, enabling the ability to send your traffic from that point in your network to Wireshare and an APM.

7. Visibility In to Your Network

Using a network test access point provides complete visibility into your network, allowing you to see every packet of data flowing in and out of your network. With a visibility point in your network, you can analyze e-commerce and web server traffic, VoIP and real-time communication applications.

Chris Bihary is CEO and Co-Founder of Garland Technology
Share this

The Latest

August 22, 2019

Recent EMA research explored the state of ESM. One of the many conclusions is that ESM is mainstream. Fully 87% have some level of ESM deployment. Not surprisingly, there is a significant divide between mature and relatively new deployments in terms of benefits derived, use of AI and automation, adoption levels, and number of non-IT areas being served from established ITSM implementations ...

August 21, 2019

For the first time, a majority of companies are putting mission critical apps in the cloud, according to the latest report by Cloud Foundry Foundation ...

August 20, 2019

The cloud continues to transform IT in every industry. But in order to migrate to the cloud, embrace these new technologies and truly evolve their business, organizations need an underlying network that can support digital transformation ...

August 19, 2019

One common infrastructure challenge arises with virtual private networks (VPNs). VPNs have long been relied upon to deliver the network connectivity and security enterprises required at a price they could afford. Organizations still routinely turn to them to provide internal and trusted third-parties with "secure" remote access to isolated networks. However, with the rise in mobile, IoT, multi- and hybrid-cloud, as well as edge computing, traditional enterprise perimeters are extending and becoming blurred ...

August 15, 2019

The configuration management database (CMDB), along with its more federated companion, the configuration management system (CMS), has been bathed in a deluge of negative opinions from all fronts — industry experts, vendors, and IT professionals. But from what recent EMA research on analytics, ITSM performance and other areas is indicating, those negative views seem to be missing out on a real undercurrent of truth — that CMDB/CMS alignments, whatever their defects, strongly skew to success in terms of overall IT progressiveness and effectiveness ...

August 14, 2019

The on-demand economy has transformed the way we move around, eat, learn, travel and connect at a massive scale. However, with disruption and big aspirations comes big, complex challenges. To take these challenges head-on, on-demand economy companies are finding new ways to deliver their services and products to an audience with ever-increasing expectations, and that's what we'll look at in this blog ...

August 13, 2019

To thrive in today's highly competitive digital business landscape, organizations must harness their "digital DNA." In other words, they need to connect all of their systems and databases — including various business applications, devices, big data and any instances of IoT and hybrid cloud environments — so they're accessible and actionable. By integrating all existing components and new technologies, organizations can gain a comprehensive, trusted view of their business functions, thereby enabling more agile deployment processes and ensuring scalable growth and relevance over the long-term ...

August 12, 2019

Advancements in technology innovation are happening so quickly, the decision of where and when to transform can be a moving target for businesses. When done well, digital transformation improves the customer experience while optimizing operational efficiency. To get there, enterprises must encourage experimentation to overcome organizational obstacles. In other words ...

August 08, 2019

IoT adoption is growing rapidly, and respondents believe 30% of their company’s revenue two years from now will be due to IoT, according to the new IoT Signals report from Microsoft Corp ...

August 07, 2019

It's been all over the news the last few months. After two fatal crashes, Boeing was forced to ground its 737. The doomed model is now undergoing extensive testing to get it back into service and production. Large organizations often tell stakeholders that even though all software goes through extensive testing, this type of thing “just happens.” But that is exactly the problem. While the human component of application development and testing won't go away, it can be eased and supplemented by far more efficient and automated methods to proactively determine software health and identify flaws ...