Mylinking™ Network Packet Broker(NPB) ML-NPB-5690
6*40GE/100GE QSFP28 plus 48*10GE/25GE SFP28, Max 1.8Tbps
1- Overviews
- A full visual control of Network Flow Capturing/processing/forwarding NPB(6* 40GE/100GE QSFP28 slots plus 48 * 10GE/25GE SFP28 slots)
- A full pre-processing and re-distribution device(bidrectional bandwidth 1.8Tbps)
- Supported collection & reception of link data from different network element locations
- Supported collection & reception of link data from different exchange routing nodes
- Supported raw packet collected, identified, analyzed, statistically summarized and marked
- Supported raw packet output for monitoring equipment of BigData Anlysis, Protocol Analysis, Signaling Analysis, Security Analysis, Risk Management and other required traffic.
- Supported real-time packet capture analysis, data source identification, and real-time/historical network traffic search
- Supported P4 programmable chip solution, data compilation and action execution engine system. The hardware level support the recognition of new data types and strategy execution ability after data identification, can be customized for packet identification, quick add new function, new protocol matching. It has excellent scenario adaptation ability for the new network features. For example, VxLAN, MPLS, heterogeneous encapsulation nesting, 3-layer VLAN nesting, additional hardware level timestamp, etc.
2- Intelligent Traffic Processing Abilities
ASIC Chip Plus Multicore CPU
1.8Tbps intelligent network traffic processing capabilities. Built-in multi-core CPU can reach up to 200Gbps intelligent traffic processing capacity
10GE/25GE/40GE/100GE Traffic Data Capure
6 slots 40G/100GE QSFP28 plus 48 slots 10GE/25GE SFP28 up to 1.8Tbps Traffic Data Transceiver at same time, for network Data Capture, simple Pre-processing
Network Traffic Replication
Packet replicated from 1 port to multiple N ports, or multiple N ports aggregated, then replicated to multiple M ports by Network Packet Broker
Network Traffic Aggregation
Packet replicated from 1 port to multiple N ports, or multiple N ports aggregated, then replicated to multiple M ports by Network Packet Broker
Data Distribution/Forwarding
Classified the incoming metdata accurately and discarded or forwarded different data services to multiple interface outputs according to user’s predefined rules.
Packet Data Filtering
Supported flexible combination of metdata elements based on Ethernet Type, VLAN Tag, TTL, IP seven-tuple, IP Fragmentation, TCP Flag, and other Packet Features fornetwork security devices, protocol analysis, signaling analysis, and traffic
Load Balance
Supported load balance Hash algorithm and session-based weight sharing algorithm according to L2-L7 layer characteristics to ensure that the port output traffic dynamic of load balancing
VLAN Tagged
VLAN Untagged
VLAN Replaced
Supported the matching of any key field in the first 128 bytes of a packet. The user can customize the offset value and key field length and content, and determine the traffic output policy according to the user configuration.
Single Fiber Transmission
Support single-fiber transmission at port rates of 10 G, 40 G, and 100 G to meet the single-fiber data receiving requirements of some back-end devices and reduce the input cost of fiber auxiliary materials when a large number of links need to be captured and distributed
Port Breakout
Supported 40G/100G port breakout function and can be split into four 10GE/25GE ports to meet specific access requirements
Time Stamping
Supported to synchronize the NTP server to correct the time and write the message into the packet in the form of a relative time tag with a timestamp mark at the end of the frame, with the accuracy of nanoseconds
Tunnel Encapsulation Stripping
Supported the VxLAN, VLAN, GRE, GTP, MPLS, IPIP header stripped in the original data packet and forwarded output.
Data/Packet De-duplication
Supported port-based or policy-level statistical granularity to compare multiple collection source data and repeats of same data packet at a specified time. Users can choose different packet identifiers (dst.ip, src.port, dst.port, tcp.seq, tcp.ack)
Data/Packet Slicing
Supported policy-based slicing (64-1518 bytes optional) of the raw data, and the traffic output policy can be implemented based on user configuration
Classified Date Masking
Supported policy-based granularity to replace any key field in the raw data in order to achieve the purpose of shielding sensitive information. According to user configuration, the traffic output policy can be implemented.
Tunneling Protocol Identification
Supported automatically identify various tunneling protocols such as GTP / GRE / VxLAN / PPTP / L2TP / PPPOE / IPIP. According to the user configuration, the traffic output strategy can be implemented according to the inner or outer layer of the
APP Layer Protocol Identify
Supported commonly used application layer protocol identification, such as FTP, HTTP, POP, SMTP, DNS, NTP, BitTorrent, Syslog, MySQL, MsSQL and so on
Video Traffic Filtering
Supported to filter and mitigate the video stream data matching such as domain name address resolution, video transmission protocol, URL and video format, to offer useful data to analyzers and monitors for security.
SSL Decryption
Supported loading the corresponding SSL certificate decryption. After the decryption of HTTPS encrypted data for the specified traffic, it will be forwarded to the back-end monitoring and analysis systems as required.
User-defined Decapsulation
Supported the user-defined packet decapsulation function, which can strip any encapsulated fields and contents in the first 128 bytes of a packet and output them
Packet Capturing
Supported real-time packet capture at the port and policy levels. When abnormal network data packets or abnormal traffic fluctuations occur, you can capture original data packets on the suspicious link or policy and download them to the local PC. Then you can use the Wireshark to quickly locate the fault.
Traffic Monitoring and Detection
Traffic monitoring provides real-time traffic situation monitoring capability. Traffic detection enables in-depth analysis of traffic data at different network locations, providing original data sources for real-time fault location
Network Traffic Insights
Supported visualization of the entire process of link data traffic from receiving, collecting, identifying, processing, scheduling, and output allocation. Through the friendly graphic and text interactive interface, multi-vision and multi-latitude display of traffic composition structure, traffic distribution on the whole network, packet identification and processing process status, traffic trends, and the relationship between traffic and time or business, transforming invisible data signals into visible, manageable and controllable entities.
Traffic Trend Alarming
Supported port-level, policy-level data traffic monitoring alarms by setting the alarm thresholds for each port and each policy flow overflow.
Historical Traffic Trend Review
Supported port-level, policy-level nearly 2 months of historical traffic statistics query. According to the days, hours, minutes and other granularity on the TX/RX rate, TX/RX bytes, TX/RX messages, TX/RX error number or other information to query select.
Real-time Traffic Detection
Supported the sources of "Capture Physical Port (Data Acquisition)", "Message Feature Description Field (L2 – L7)", and other information to define flexible traffic filter, for real-time capture network data traffic of different position detection, and will it will be storaged the real-time data after captured and detected in the device for downloading of further execution expert analysis or uses its diagnosis features of this equipment for deep visualization analysis.
DPI Packet Analysis
DPI in-depth analysis module of the traffic visualization detection function can conduct in-depth analysis of the captured target traffic data from multiple dimensions, and perform detailed statistical display in the form of graphs and tables Supported the captured datagram analysis, including abnormal datagram analysis, stream recombination, transmission path analysis, and abnormal stream analysis
NetFlow Output
Supported generating NetFlow data from traffic and exporting the generated NetFlow data to the corresponding analysis tools. Supported NetFlow sampling rate customization, the Netflow version supports V5, V9, IPFIX multiple versions.
Mylinking™ Visibility Platform
Supported Mylinking™ Matrix-SDN Visual Control Platform Access
1+1 Redundant Power System(RPS)
Supported 1+1 Dual Redundant Power System
3- Typical Application Structures
3.1 Mylinking™ Network Packet Broker Centralized Collection Application(as following)
3.2 Mylinking™ Network Packet Broker Unified Schedule Application(as following)
3.3 Mylinking™ Network Packet Broker Data/Packet De-duplication Application(as following)
3.4 Mylinking™ Network Packet Broker Data/Packet De-duplication Application(as following)
3.5 Mylinking™ Network Packet Broker Data/Packet Masking Application(as following)
3.6 Mylinking™ Network Packet Broker Data/Packet Slicing Application(as following)
3.7Mylinking™ Network Traffic Data Visibility Analysis Application(as following)
4-Specifications
ML-NPB-5690 Mylinking™ Network Packet Broker Functional Parameters |
|||
Network Interface
|
10GE(compatible with 25G) |
48*SFP+ slots; Supports single and multi-mode optical fibers |
|
100G(compatible with 40G) |
6*QSFP28 slots; Support 40GE, breakout to be 4*10GE/25GE; Supports single and multi-mode optical fibers |
||
Out-of-Band MGT Interface |
1*10/100/1000M electrical port | ||
Deployment Mode
|
Optical Mode |
Supported |
|
Mirror Span Mode |
Supported |
||
System Function |
Basic Traffic Processing |
Traffic Replication/aggregation/distribution |
Supported |
Load Balancing |
Supported |
||
Based on IP / protocol / port seven-tuple traffic identification filtering |
Supported |
||
Single Fiber Transmission |
Supported |
||
VLAN mark/replace/delete |
Supported |
||
Tunnel protocol identification |
Supported |
||
Tunnel encapsulation stripping |
Supported |
||
Port breakout |
Supported |
||
Ethernet package independence |
Supported |
||
Processing ability |
1.8Tbps |
||
Intelligent Traffic Processing |
Time-stamping |
Supported |
|
Tag remove, decapsulation |
Supported VxLAN, VLAN, GRE, MPLS, etc. header stripping |
||
Data de-duplication |
Supported interface/policy level |
||
Packet slicing |
Supported policy level |
||
Data desensitization(Data Masking) |
Supported policy level |
||
Tunneling protocol identification |
Supported |
||
Application layer protocol identification |
Supported FTP/HTTP/POP/SMTP/DNS/NTP/
BitTorrent/SYSLOG/MYSQL/MSSQL, etc. |
||
Video traffic identification |
Supported |
||
SSL decryption |
Supported |
||
NetFlow |
Supported V5, V9, IPFIX multiple versions |
||
Custom decapsulation |
Supported |
||
Processing ability |
200Gbps |
||
Diagnosis and Monitoring |
Real-time monitor |
Supported interface/policy level |
|
Traffic alarm |
Supported interface/policy level |
||
Historical traffic review |
Supported interface/policy level |
||
Traffic capture |
Supported interface/policy level |
||
Traffic Visibility Detection
|
Basic Analysis |
Summary statistics are displayed based on basic information such as packet count, packet category distribution, number of session connections, and packet protocol distribution |
|
DPI Analysis |
Supports transport layer protocol ratio analysis; unicast broadcast multicast ratio analysis, IP traffic ratio analysis, DPI application ratio analysis. Support data content based on sampling time analysis of traffic size presentation. Supports data analysis and statistics based on session flow. |
||
Accurate Fault Analysis |
Supported fault analysis and location based on traffic data, including packet transmission behavior analysis, data flow level fault analysis, packet level fault analysis, security fault analysis, and network fault analysis. | ||
Management |
CONSOLE MGT | Supported | |
IP/WEB MGT | Supported | ||
SNMP MGT | Supported | ||
TELNET/SSH MGT | Supported | ||
RADIUS or TACACS + Centralized authorization authentication |
Supported | ||
SYSLOG protocol | Supported | ||
User authentication | Based on user’s password authentication | ||
Electric(1+1 Redundant Power System-RPS) | Rate power supply voltage |
AC110~240V/DC-48V(optional) |
|
Rate power supply frequency |
AC-50HZ |
||
Rate input current |
AC-3A / DC-10A |
||
Rate power |
Max 650W |
||
Environment
|
Working temperature |
0-50℃ |
|
Storage temperature |
-20-70℃ |
||
Working humidity |
10%-95%no condensation |
||
User Configuration
|
Console configuration | RS232 interface, 115200,8,N,1 | |
Password authentication |
Supported |
||
Height of Chassis |
Rack space (U) |
1U 445mm*44mm*505mm |
5-Order Information
ML- NPB-5690 6*40G/100 QSFP28 slots plus 48*10GE/25GE SFP28 slots, 1.8Tbps