SlideShare a Scribd company logo
A DATACOM SYSTEMS WHITE PAPER
A guide to improving security visibility
Deploying
Network Taps
for improved
security
DATACOM
S Y S T E M S I N C
Improve
Visibility
C
ompanies are continuously improving their
security infrastructure to combat both internal
and external threats. The deployment and
resources required to improve security are under
constant assessment. Improved methods to monitor and
troubleshoot security problems can have a significant
impact on uptime and customer satisfaction.
A network security detection and prevention scheme
using a combination of network taps and aggregation
devices can improve visibility and redundancy, reduce
system complexity and diminish initial and continuing
costs for implementation.
The most common location for a security probe is at
external points of egress. This architecture evaluates
incoming and outgoing traffic and intercepts malicious
traffic just inside the firewall. External threats have
traditionally been the primary concern for security
professionals.
Currently, internal threats from existing employees with
authorized accounts represent a major security threat.
Authorized accounts can gain access via a VPN, wireless
or wired connection which is usually terminated beyond
the firewall. The deployment of security devices and
probes inside the network to combat these internal
threats is becoming increasing common.
Certain critical servers hold information that should be
strictly prohibited. Critical records include company
financial data, customer information, and employee
passwords or Social Security numbers. The servers with
this information are often found at the core of the
network and connected to high-availability network
devices. Protecting this information is the primary goal
of strong security protection architectures. The following
figure depicts these typical locations of security probes
within the network. The dashed lines represent the links
that the probes are receiving data from, for their analysis.
While this is a perfectly valid solution, there are additional
details that should be considered when designing this
type of security system.
Placing security monitoring solutions in multiple
locations around the network is not always technically
or financially feasible. Managing a large number of
devices and the alarm information that they produce
can be overwhelming. A more practical approach
is to determine the most desirable information that
exists in the company, and begin placing safeguards
around that information or the devices where it is stored.
Consider the following figure that demonstrates a
common network physical topology.
A network security detection and prevention
scheme using a combination of network taps
and aggregation devices can improve visibility
and redundancy, reduce system complexity
and diminish initial and continuing costs for
implementation.
2 | Deploying Network Taps |WHITE PAPER | Deploying Network Taps | 3
Typical network
deployment
Managing a
large number
of devices
and the alarm
information
that they
produce can be
overwhelming.
A more practical
approach is to
determine the
most desirable
information that
exists in the
company, and
begin placing
safeguards
around that
information or
the devices
where it is stored.
Port
Mirror
Port
Mirror
Port
Mirror
Probe Probe
Probe
CriticalServerTraffic
UserTraffic
from specific port(s) on the Ethernet switch and copies
the traffic to the port mirror. When a security device
is connected to the port mirror in theory, it will see the
traffic coming from the designated ports.
While port mirrors have the advantage of being
integrated into the network device and are able to
show traffic crossing the Ethernet switch backplane, they
have some drawbacks. Many security professionals use
port mirrors but are unaware that less than 100% of the
traffic will be sent to the mirror port. Since the port mirror
is a software implementation, traffic destined to the
mirror may be dropped if the Ethernet switch becomes
congested.
4 | Deploying Network Taps |
Security probes or Intrusion Detection Systems (IDS) use
a variety of algorithms to analyze potential threats.
While each manufacturer has their own unique way of
analyzing, categorizing and reporting potential threats
they are only as effective as the information that they
receive.
Many security devices receive data via methods that
do not provide them complete information on the
traffic traveling on a network link. A “port mirror” is a
software based connection that is created inside a
network device, most commonly an Ethernet switch or
Router. The port mirror makes copies of traffic coming
A network device can support a restricted number
of port mirrors. This limitation is increasingly
important as more security and analysis devices try
to access the same data.
Probes and
port mirrors
Title: Subtitle of whitepaper Deploying Network Taps| 5
A network device can support a restricted number of
port mirrors. This limitation is increasingly important as
more security and analysis devices try to access the
same data. A variety of groups and departments are
also creating and maintaining their own monitoring
solutions, independent of the IT (Information Technology)
Group. Providing network access to these additional
departments is another challenge faced by the
maintainers of corporate communication systems and
drives the need for greater network visibility.
Port mirrors are configured using the Ethernet switch
software. Port mirrors can be accidentally or intentionally
turned off. The ability to remotely turn off the traffic
feeding a network security device gives security and
audit personnel cause for alarm.
Curing a critical event, the last thing a network engineer
needs to worry about is taking time and care to setup
a port mirror, and ensure that the appropriate traffic
is copied to recording or analysis tools. An incorrectly
created port mirror can create additional network
congestion or shutdown required ports.
Probe
deployment
using port mirrors
The port mirror
makes copies
of traffic coming
from specific
port(s) on the
Ethernet switch
and copies the
traffic to the port
mirror. When a
security device
is connected to
the port mirror
in theory, it will
see the traffic
coming from the
designated ports.
6 | Deploying Network Taps | |Deploying Network Taps | 7
Probe
Aggregator
A network TAP (Test Access Point) makes a copy of
information in a network connection. The TAP is designed
so that it does not become a point of failure in the
network. TAPs are designed so that traffic on the network
link continues to flow, even if the TAP loses power. TAPs
also minimize latency between the network link and the
monitor port on the TAP. TAPs will aggregate duplex
traffic onto a single output port, while providing buffering
capability to handle traffic utilization surges. TAPs can
also provide identical copies of traffic so that multiple
tools all see the same data. These “regeneration” TAPs
are deployed when redundant probes or security tools
need to have 24X7 visibility to a network segment. The
failure of one security device does not create an issue,
since the other security device sees the same network
data from the TAP.
Placement of TAPs is typically in the locations with the
most critical information in the network. TAPs will provide
continuous monitoring on links where critical information
travels, or on links leading to servers or storage devices
where the data resides. TAPs are designed around a
hardware-based architecture that minimizes latency,
so their deployment can be made anywhere in the
network.
Similar to security probes, some common locations for
TAPs include inside the firewall, network trunks or links to or
from critical servers.
Deploying a combination of network TAPs and probes
is an alternative method to placing security probes
throughout the network. The passive nature of TAPs,
ensure that network communication is maintained.
Combining TAP outputs with the use of an aggregation
device means greater visibility for the network probe.
An aggregator is a device that combines many inputs
into a single output. Aggregators can eliminate the use
of multiple probes by merging outputs from several TAPs
together. Aggregators are deployed where the sum of
the inputs is less than the capacity of the output. Many
aggregators have an added benefit of creating multiple
outputs, where each output is identical to the other.
Since the aggregator sends identical traffic to its’ output
ports, all probes on an aggregator see the same traffic.
If one probe fails, the other is able to continue securing
the network. TAPs and Aggregators are a cost effective
solution to an organization that is starting to do security
analysis with low utilization on their links.
Improved security visibility using network TAPs to
monitor and troubleshoot security problems is one
method currently being employed by most Fortune
500 companies. They are always on, and eliminate the
time to setup, configure and troubleshoot port mirrors.
TAPs whose outputs are aggregated together can also
effectively simplify and reduce the cost of the security
solution. TAPs can provide an improved method of
network access over port mirrors. TAP deployment is a
proven and secure mechanism for improved visibility and
redundancy.
Tapping
the link
Aggregators can eliminate the use of multiple
probes by merging outputs from several TAPs
together.
Common
network TAP
locations
Placement of
TAPs should be
in accordance
with the
location of the
most critical
information in
the network.
Aggregation of
TAP outputs
Combining TAP
outputs with
the use of an
aggregation
device means
greater visibility
for the network
probe.
Datacom Systems Inc.
9 Adler Drive
East Syracuse, NY 13057
250 Park Ave.
7th Floor (Suite 7072)
New York, New York 10177
Datacom Systems Inc. UK
107 Cheapside
London
EC2V6DT
DATACOM
S Y S T E M S I N C
Enquiries
US & Canada: +1 315 463 1585
Europe: +44 (0)20 7397 3795
www.datacomsystems.com
© Datacom Systems. 2013. All rights reserved.

More Related Content

PDF
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
PDF
Passive monitoring to build Situational Awareness
PDF
J1087181
PDF
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PPT
Blug Talk
PDF
10 Criteria for Evaluating NPB, Security Architect Edition
PDF
Next Generation Network: Security and Architecture
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
Passive monitoring to build Situational Awareness
J1087181
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
Blug Talk
10 Criteria for Evaluating NPB, Security Architect Edition
Next Generation Network: Security and Architecture

What's hot (17)

PDF
How to Choose a SandBox - Gartner
PDF
Detecting Hacks: Anomaly Detection on Networking Data
PDF
Interfirewall optimization across various administrative domain for enabling ...
PDF
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
PDF
Review of network diagram
PDF
Ii2514901494
PDF
IRJET - Implementation of Firewall in a Cooperate Environment
DOC
Cst 630 Motivated Minds/newtonhelp.com
PDF
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
PDF
Dp4301696701
PPT
Intrusion Detection Techniques for Mobile Wireless Networks
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PPT
Amm Icict 12 2005
PPTX
Network Intrusion Detection and Countermeasure Selection
PPTX
Check Point: From Branch to Data Center
PDF
IRJET- Comparative Study on Network Monitoring Tools
How to Choose a SandBox - Gartner
Detecting Hacks: Anomaly Detection on Networking Data
Interfirewall optimization across various administrative domain for enabling ...
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Review of network diagram
Ii2514901494
IRJET - Implementation of Firewall in a Cooperate Environment
Cst 630 Motivated Minds/newtonhelp.com
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
Dp4301696701
Intrusion Detection Techniques for Mobile Wireless Networks
Optimized Intrusion Detection System using Deep Learning Algorithm
Amm Icict 12 2005
Network Intrusion Detection and Countermeasure Selection
Check Point: From Branch to Data Center
IRJET- Comparative Study on Network Monitoring Tools
Ad

Similar to Deploying Network Taps for Improved Security (20)

PDF
Gigamon - Network Visibility Solutions
PPTX
PPT
Smart Grid Cyber Security
DOC
Agent based intrusion detection, response and blocking using signature method...
PPTX
lecture 6 - Network Security Fundamentals.pptx
PPT
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
PDF
Networking for java and dotnet 2016 - 17
PPTX
International Journal of Network Security & Its Applications (IJNSA)
PDF
International Journal of Engineering Research and Development
PDF
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
PDF
Guardians of Connection: Signalling Protection in the Digital Age
DOCX
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
PPTX
Sdn pres v2-Software-defined networks
PPT
Presentation, Firewalls
PPTX
Advance Technology
PDF
Security assignment (copy)
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
CISA GOV - Seven Steps to Effectively Defend ICS
PDF
Defending industrial control systems from cyber attack
Gigamon - Network Visibility Solutions
Smart Grid Cyber Security
Agent based intrusion detection, response and blocking using signature method...
lecture 6 - Network Security Fundamentals.pptx
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
Networking for java and dotnet 2016 - 17
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Engineering Research and Development
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Guardians of Connection: Signalling Protection in the Digital Age
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
Sdn pres v2-Software-defined networks
Presentation, Firewalls
Advance Technology
Security assignment (copy)
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
CISA GOV - Seven Steps to Effectively Defend ICS
Defending industrial control systems from cyber attack
Ad

Recently uploaded (20)

PPTX
sdn_based_controller_for_mobile_network_traffic_management1.pptx
PPTX
ERP good ERP good ERP good ERP good good ERP good ERP good
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
quadraticequations-111211090004-phpapp02.pptx
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PDF
-DIGITAL-INDIA.pdf one of the most prominent
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
DOCX
A PROPOSAL ON IoT climate sensor 2.docx
PPTX
KVL KCL ppt electrical electronics eee tiet
PDF
Cableado de Controladores Logicos Programables
PPTX
Nanokeyer nano keyekr kano ketkker nano keyer
PPTX
Operating System Processes_Scheduler OSS
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
Embeded System for Artificial intelligence 2.pptx
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
PPTX
material for studying about lift elevators escalation
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
Computers and mobile device: Evaluating options for home and work
sdn_based_controller_for_mobile_network_traffic_management1.pptx
ERP good ERP good ERP good ERP good good ERP good ERP good
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
quadraticequations-111211090004-phpapp02.pptx
Smarter Security: How Door Access Control Works with Alarms & CCTV
-DIGITAL-INDIA.pdf one of the most prominent
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
Hypersensitivity Namisha1111111111-WPS.ppt
A PROPOSAL ON IoT climate sensor 2.docx
KVL KCL ppt electrical electronics eee tiet
Cableado de Controladores Logicos Programables
Nanokeyer nano keyekr kano ketkker nano keyer
Operating System Processes_Scheduler OSS
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Embeded System for Artificial intelligence 2.pptx
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
material for studying about lift elevators escalation
Fundamentals of Computer.pptx Computer BSC
Computers and mobile device: Evaluating options for home and work

Deploying Network Taps for Improved Security

  • 1. A DATACOM SYSTEMS WHITE PAPER A guide to improving security visibility Deploying Network Taps for improved security DATACOM S Y S T E M S I N C
  • 2. Improve Visibility C ompanies are continuously improving their security infrastructure to combat both internal and external threats. The deployment and resources required to improve security are under constant assessment. Improved methods to monitor and troubleshoot security problems can have a significant impact on uptime and customer satisfaction. A network security detection and prevention scheme using a combination of network taps and aggregation devices can improve visibility and redundancy, reduce system complexity and diminish initial and continuing costs for implementation. The most common location for a security probe is at external points of egress. This architecture evaluates incoming and outgoing traffic and intercepts malicious traffic just inside the firewall. External threats have traditionally been the primary concern for security professionals. Currently, internal threats from existing employees with authorized accounts represent a major security threat. Authorized accounts can gain access via a VPN, wireless or wired connection which is usually terminated beyond the firewall. The deployment of security devices and probes inside the network to combat these internal threats is becoming increasing common. Certain critical servers hold information that should be strictly prohibited. Critical records include company financial data, customer information, and employee passwords or Social Security numbers. The servers with this information are often found at the core of the network and connected to high-availability network devices. Protecting this information is the primary goal of strong security protection architectures. The following figure depicts these typical locations of security probes within the network. The dashed lines represent the links that the probes are receiving data from, for their analysis. While this is a perfectly valid solution, there are additional details that should be considered when designing this type of security system. Placing security monitoring solutions in multiple locations around the network is not always technically or financially feasible. Managing a large number of devices and the alarm information that they produce can be overwhelming. A more practical approach is to determine the most desirable information that exists in the company, and begin placing safeguards around that information or the devices where it is stored. Consider the following figure that demonstrates a common network physical topology. A network security detection and prevention scheme using a combination of network taps and aggregation devices can improve visibility and redundancy, reduce system complexity and diminish initial and continuing costs for implementation. 2 | Deploying Network Taps |WHITE PAPER | Deploying Network Taps | 3 Typical network deployment Managing a large number of devices and the alarm information that they produce can be overwhelming. A more practical approach is to determine the most desirable information that exists in the company, and begin placing safeguards around that information or the devices where it is stored.
  • 3. Port Mirror Port Mirror Port Mirror Probe Probe Probe CriticalServerTraffic UserTraffic from specific port(s) on the Ethernet switch and copies the traffic to the port mirror. When a security device is connected to the port mirror in theory, it will see the traffic coming from the designated ports. While port mirrors have the advantage of being integrated into the network device and are able to show traffic crossing the Ethernet switch backplane, they have some drawbacks. Many security professionals use port mirrors but are unaware that less than 100% of the traffic will be sent to the mirror port. Since the port mirror is a software implementation, traffic destined to the mirror may be dropped if the Ethernet switch becomes congested. 4 | Deploying Network Taps | Security probes or Intrusion Detection Systems (IDS) use a variety of algorithms to analyze potential threats. While each manufacturer has their own unique way of analyzing, categorizing and reporting potential threats they are only as effective as the information that they receive. Many security devices receive data via methods that do not provide them complete information on the traffic traveling on a network link. A “port mirror” is a software based connection that is created inside a network device, most commonly an Ethernet switch or Router. The port mirror makes copies of traffic coming A network device can support a restricted number of port mirrors. This limitation is increasingly important as more security and analysis devices try to access the same data. Probes and port mirrors Title: Subtitle of whitepaper Deploying Network Taps| 5 A network device can support a restricted number of port mirrors. This limitation is increasingly important as more security and analysis devices try to access the same data. A variety of groups and departments are also creating and maintaining their own monitoring solutions, independent of the IT (Information Technology) Group. Providing network access to these additional departments is another challenge faced by the maintainers of corporate communication systems and drives the need for greater network visibility. Port mirrors are configured using the Ethernet switch software. Port mirrors can be accidentally or intentionally turned off. The ability to remotely turn off the traffic feeding a network security device gives security and audit personnel cause for alarm. Curing a critical event, the last thing a network engineer needs to worry about is taking time and care to setup a port mirror, and ensure that the appropriate traffic is copied to recording or analysis tools. An incorrectly created port mirror can create additional network congestion or shutdown required ports. Probe deployment using port mirrors The port mirror makes copies of traffic coming from specific port(s) on the Ethernet switch and copies the traffic to the port mirror. When a security device is connected to the port mirror in theory, it will see the traffic coming from the designated ports.
  • 4. 6 | Deploying Network Taps | |Deploying Network Taps | 7 Probe Aggregator A network TAP (Test Access Point) makes a copy of information in a network connection. The TAP is designed so that it does not become a point of failure in the network. TAPs are designed so that traffic on the network link continues to flow, even if the TAP loses power. TAPs also minimize latency between the network link and the monitor port on the TAP. TAPs will aggregate duplex traffic onto a single output port, while providing buffering capability to handle traffic utilization surges. TAPs can also provide identical copies of traffic so that multiple tools all see the same data. These “regeneration” TAPs are deployed when redundant probes or security tools need to have 24X7 visibility to a network segment. The failure of one security device does not create an issue, since the other security device sees the same network data from the TAP. Placement of TAPs is typically in the locations with the most critical information in the network. TAPs will provide continuous monitoring on links where critical information travels, or on links leading to servers or storage devices where the data resides. TAPs are designed around a hardware-based architecture that minimizes latency, so their deployment can be made anywhere in the network. Similar to security probes, some common locations for TAPs include inside the firewall, network trunks or links to or from critical servers. Deploying a combination of network TAPs and probes is an alternative method to placing security probes throughout the network. The passive nature of TAPs, ensure that network communication is maintained. Combining TAP outputs with the use of an aggregation device means greater visibility for the network probe. An aggregator is a device that combines many inputs into a single output. Aggregators can eliminate the use of multiple probes by merging outputs from several TAPs together. Aggregators are deployed where the sum of the inputs is less than the capacity of the output. Many aggregators have an added benefit of creating multiple outputs, where each output is identical to the other. Since the aggregator sends identical traffic to its’ output ports, all probes on an aggregator see the same traffic. If one probe fails, the other is able to continue securing the network. TAPs and Aggregators are a cost effective solution to an organization that is starting to do security analysis with low utilization on their links. Improved security visibility using network TAPs to monitor and troubleshoot security problems is one method currently being employed by most Fortune 500 companies. They are always on, and eliminate the time to setup, configure and troubleshoot port mirrors. TAPs whose outputs are aggregated together can also effectively simplify and reduce the cost of the security solution. TAPs can provide an improved method of network access over port mirrors. TAP deployment is a proven and secure mechanism for improved visibility and redundancy. Tapping the link Aggregators can eliminate the use of multiple probes by merging outputs from several TAPs together. Common network TAP locations Placement of TAPs should be in accordance with the location of the most critical information in the network. Aggregation of TAP outputs Combining TAP outputs with the use of an aggregation device means greater visibility for the network probe.
  • 5. Datacom Systems Inc. 9 Adler Drive East Syracuse, NY 13057 250 Park Ave. 7th Floor (Suite 7072) New York, New York 10177 Datacom Systems Inc. UK 107 Cheapside London EC2V6DT DATACOM S Y S T E M S I N C Enquiries US & Canada: +1 315 463 1585 Europe: +44 (0)20 7397 3795 www.datacomsystems.com © Datacom Systems. 2013. All rights reserved.