October 14, 2022

The Importance of In-Line Network TAPs

 

Your security tools are as good as the data that is put into them.


The effectiveness of any system, including your cloud environment, analytics tools, IPS (Intrusion Prevention System), and IDS (Intrusion Detection System), depends on the information provided to it. It has never been more crucial to know where you are getting your data from and if you are seeing the whole data stream.


So having complete visibility into your network traffic is critical, however, it might not be as easy as merely mirroring your traffic to another SPAN port on a switch. Many modern firewalls and switches will, by default, discard or change a large portion of the network traffic that they perceive to be errors. For some applications, this is acceptable and is done to reduce bandwidth/latency. But when it comes to supplying network traffic for security-related applications, all the raw data is needed.


Given the high possibility that they are a sign that your network is being scanned or fingerprinted, fragmented packet visibility is crucial for any security appliance or application. For example, to protect TCP packets from firewall filters, IP fragments might be employed. Typically, a firewall will attempt to reassemble these packets before forwarding them. However, this raw traffic should be examined by your network security appliance or application, but if you position your network TAP on a switch behind the firewall, you risk missing it. IP fragmentation may also be an indication of an ongoing DoS (Denial of Service) or DDoS (Distributed Denial of Service) attack directed at your network or a device connected to it.


Critical Role of Network TAPs


So the critical question is: Where can I get data that can capture all of it without jeopardizing my network security? The answer to this is by placing network TAPs where, in case of a failure, it would not affect network functionality.


TAPs are independent devices that connect network security and monitoring appliances to network links safely and securely. Network traffic flows into the TAP. A mirror copy of the traffic is then passed on to an appliance that is also connected to ports on the TAP. While the mirror traffic is passed to the appliance, live network traffic continues to pass back into the network without significant delay. TAPs also provide network fail-safe technology which will keep network traffic flowing even if power to the TAP or connected appliance is lost. Therefore, multiple security appliances can safely be connected to links using TAPs without impacting the reliability or availability of the live network.


The Inline tool is monitored with heartbeats

TAPs can be deployed out-of-band or in-line. Monitoring appliances generally use out-of-band mode which, as noted above, sends a mirror copy of the data to the appliance for analysis but does not interact with live data. Deploying TAPs in-line means that live data travels from the TAP through the appliance and then back into the live network. This method allows security appliances to interact in real-time with live data allowing the appliance to immediately isolate and block malware before damage is done to the network. In-line TAPs automatically bypass an appliance if it is taken offline for any reason. This feature keeps live traffic flowing even if an appliance is down simplifying maintenance windows and troubleshooting.


Advanced features that are found in intelligent TAPs offer aggregation, filtering, and port mapping. These features also provide economic efficiencies allowing flexibility in determining traffic flows to the appliances. By aggregating underutilized links, appliances can support multiple links providing CAPEX savings. Filtering unneeded traffic also lessens the traffic burden on appliances allowing more efficient operation and faster response times to threats. Port mapping provides a simple method of directing traffic from the TAP to the appliance and back into the network.



When developing a network protection strategy, it is important to deploy the right monitoring and security appliances. It is critical, however, to include TAPs in the architecture plan from the beginning. Appliance connectivity with TAPs will allow maximum protection and budget discipline without compromising network reliability or availability. To learn more about network monitoring and visibility, contact Network Critical’s expert team at networkcritical.com

October 12, 2022

5 Things To Do With Your NetAlly Aircheck and General WiFi checks

 While working on site, a client was impressed with all the ‘quick’ things I did with my various tools. He then commented that I should write some of your tips and tricks up. At first, I thought I already do that, but then realized that I haven’t done it for all of my tools.

So here you go, some tips and tricks for using the Netally Aircheck G2.



October 10, 2022

Wi-Fi Survey Overview

 I have received a lot of emails expressing interest in Wi-Fi site surveys. Everything from outdoor point to point, factories, and of course, office environments.


I thought I would start with a brief overview and then put out more specific articles later.

What I found interesting about the emails I received was the common theme where people said “I just want to figure out how to do it without getting bogged down with the technical stuff.”


In this and the following videos, I will focus on how to do it, and tips/tricks along the way. I agree that a lot of people get paralyzed with fear because they think they have to overanalyze everything from the get-go.


Enjoy the first video and keep the feedback coming.



October 05, 2022

Wireshark 4.0.0 Simple Layout Fix

 For those of you who do not use Wireshark regularly and just upgraded to version 4 , will notice the default layout has been changed from the ‘stacked’ view to the 1x2 display.

I figured I would show you how to put it back if you prefer the old format.



October 03, 2022

WiFi Ghosts

 I like a catchy title and I figured since Halloween is around the corner, why not? 😉


It drives me crazy when I see people randomly rebooting everything when things go wrong. When possible, I prefer to do a bit of homework to at least try and identify the device causing, or having the issue. Without this vital piece of information, you will never get to the bottom of chronic network issues.


I’ve seen technicians walk over to a rack or cabinet and literally pull the power to everything in it as a last ditch attempt to ‘resolve’ the issue. All I can say is “Yikes!!”


In this video I show you some odd WiFi behavior my client was experiencing. Before we rebooted anything, we took a moment to at least try and single out which device was having the issue.


Watch what happens and enjoy.



Popular post in the past 30 days