The Protector Series accesses, captures, and delivers traffic from one or more full-duplex networks to multiple active and passive network intelligence tools. Policy-based triggers, health checks, and fail-open / fail-closed configurability combine with filteringand load balancing to provide redundancy and high availability for in-band and out-of-band visibility.
Secure: Local and remote manageability with user-specific access restrictions, AAA user authentication, and traffic ports without an IP address on the network combine to safeguard your security and performance monitoring tools and access to the Protector units.
Flexible: Dynamic port type (input, output, or stack) and setting configurability, with pluggable ports, provide adaptable solutions to meet your specific deployment needs. Bypass and I/O ports support both active and passive network monitoring.
High Performance: Full line rate throughput, all layer 1 and 2 functionality, and low latency throughput to monitor output guarantee full visibility at line speed. Positive health check packets test the health and state of the monitoring appliance while Negative health check packets verify software state of the active tool.
Reliable: Redundant power supplies, user defined trigger policies, and policy-based load balancing provide active options for defining monitoring tool failure scenarios, in addition to traffic re-distribution to active and standby tools.
Scalable: Up to 63 Protector and other DTCS devices can be stacked to form a network intelligence optimization layer on one unified platform. |